Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-16871 (GCVE-0-2018-16871)
Vulnerability from cvelistv5
Published
2019-07-30 16:19
Modified
2024-08-05 10:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871" }, { "name": "RHSA-2019:2696", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "name": "RHSA-2019:2730", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K18657134" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2020:0740", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20211004-0002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kernel:", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "all 3.x, all 4.x up to 4.20" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-04T18:06:18", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871" }, { "name": "RHSA-2019:2696", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "name": "RHSA-2019:2730", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K18657134" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2020:0740", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20211004-0002/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16871", "datePublished": "2019-07-30T16:19:25", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-16871\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-07-30T17:15:12.187\",\"lastModified\":\"2024-11-21T03:53:29.660\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un fallo en la implementaci\u00f3n de NFS del kernel de Linux, todas las versiones 3.x y todas las versiones 4.x hasta 4.20. Un atacante, capaz de montar un sistema de archivos NFS exportado, es capaz de desencadenar una desreferencia de puntero null mediante el uso de una secuencia NFS no v\u00e1lida. Esto puede poner en p\u00e1nico a la m\u00e1quina y negar el acceso al servidor NFS. Se perder\u00e1n todas las escrituras de disco pendientes en el servidor NFS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndIncluding\":\"4.20\",\"matchCriteriaId\":\"CC830F9C-B39B-46E9-8544-573950D04576\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60937D60-6B78-400F-8D30-7FCF328659A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB0FFE3-4BE1-4024-BCC6-1B87074DE2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108A2215-50FB-4074-94CF-C130FA14566D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F0B6C0-F930-480D-962B-3F4EFDCC13C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803BC414-B250-4E3A-A478-A3881340D6B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEB3337-BFDE-462A-908B-176F92053CEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736AEAE9-782B-4F71-9893-DED53367E102\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2696\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2730\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0740\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20211004-0002/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K18657134\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20211004-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K18657134\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2019:3252-1
Vulnerability from csaf_suse
Published
2019-12-11 10:09
Modified
2019-12-11 10:09
Summary
Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_3 fixes several issues.
The following security issues were fixed:
- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).
- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a
null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server
(bsc#1156320).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
Patchnames
SUSE-2019-3252,SUSE-SLE-Live-Patching-12-SP4-2019-3252,SUSE-SLE-Live-Patching-12-SP4-2019-3253
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_3 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).\n- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a \n null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server\n (bsc#1156320). \n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-3252,SUSE-SLE-Live-Patching-12-SP4-2019-3252,SUSE-SLE-Live-Patching-12-SP4-2019-3253", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3252-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:3252-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193252-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:3252-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" }, { "category": "self", "summary": "SUSE Bug 1153108", "url": "https://bugzilla.suse.com/1153108" }, { "category": "self", "summary": "SUSE Bug 1156320", "url": "https://bugzilla.suse.com/1156320" }, { "category": "self", "summary": "SUSE Bug 1156321", "url": "https://bugzilla.suse.com/1156321" }, { "category": "self", "summary": "SUSE Bug 1156331", "url": "https://bugzilla.suse.com/1156331" }, { "category": "self", "summary": "SUSE Bug 1156334", "url": "https://bugzilla.suse.com/1156334" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20856 page", "url": "https://www.suse.com/security/cve/CVE-2018-20856/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13272 page", "url": "https://www.suse.com/security/cve/CVE-2019-13272/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15917 page", "url": "https://www.suse.com/security/cve/CVE-2019-15917/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP4)", "tracking": { "current_release_date": "2019-12-11T10:09:04Z", "generator": { "date": "2019-12-11T10:09:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:3252-1", "initial_release_date": "2019-12-11T10:09:04Z", "revision_history": [ { "date": "2019-12-11T10:09:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "product_id": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "product_id": "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "product_id": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", "product_id": "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:09:04Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20856" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20856", "url": "https://www.suse.com/security/cve/CVE-2018-20856" }, { "category": "external", "summary": "SUSE Bug 1143048 for CVE-2018-20856", "url": "https://bugzilla.suse.com/1143048" }, { "category": "external", "summary": "SUSE Bug 1156331 for CVE-2018-20856", "url": "https://bugzilla.suse.com/1156331" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:09:04Z", "details": "important" } ], "title": "CVE-2018-20856" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:09:04Z", "details": "moderate" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-13272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13272" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13272", "url": "https://www.suse.com/security/cve/CVE-2019-13272" }, { "category": "external", "summary": "SUSE Bug 1140671 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1140671" }, { "category": "external", "summary": "SUSE Bug 1156321 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1156321" }, { "category": "external", "summary": "SUSE Bug 1198122 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1198122" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:09:04Z", "details": "moderate" } ], "title": "CVE-2019-13272" }, { "cve": "CVE-2019-15917", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15917" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15917", "url": "https://www.suse.com/security/cve/CVE-2019-15917" }, { "category": "external", "summary": "SUSE Bug 1149539 for CVE-2019-15917", "url": "https://bugzilla.suse.com/1149539" }, { "category": "external", "summary": "SUSE Bug 1156334 for CVE-2019-15917", "url": "https://bugzilla.suse.com/1156334" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:09:04Z", "details": "important" } ], "title": "CVE-2019-15917" } ] }
suse-su-2019:1829-1
Vulnerability from csaf_suse
Published
2019-07-12 09:45
Modified
2019-07-12 09:45
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel version 4.12.14 was updated to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-10638: Attackers used to be able to track the Linux kernel by the IP
ID values the kernel produces for connection-less protocols. When such
traffic was sent to multiple destination IP addresses, it was possible to
obtain hash collisions (of indices to the counter array) and thereby obtain
the hashing key (via enumeration). An attack could have been conducted by
hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to
attacker-controlled IP addresses. [bnc#1140575]
- CVE-2019-10639: The Linux kernel used to allow Information Exposure (partial
kernel address disclosure), leading to a KASLR bypass. Specifically, it was
possible to extract the KASLR kernel image offset using the IP ID values the
kernel produces for connection-less protocols. When such traffic was sent to
multiple destination IP addresses, it was possible to obtain hash collisions
(of indices to the counter array) and thereby obtain the hashing key (via
enumeration). This key contains enough bits from a kernel address (of a
static variable) so when the key was extracted (via enumeration), the offset
of the kernel image was exposed. This attack could be carried out remotely by
the attacker forcing the target device to send UDP or ICMP traffic to
attacker-controlled IP addresses. Forcing a server to send UDP traffic is
trivial if the server is a DNS server. ICMP traffic is trivial if the server
answers ICMP Echo requests (ping). For client targets, if the target visits
the attacker's web page, then WebRTC or gQUIC can be used to force UDP
traffic to attacker-controlled IP addresses. [bnc#1140577]
- CVE-2018-20836: A race condition used to exist in smp_task_timedout() and
smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a
use-after-free. [bnc#1134395]
- CVE-2019-10126: A heap based buffer overflow in the wireless driver code was
fixed. This issue might have lead to memory corruption and possibly other
consequences. [bnc#1136935]
- CVE-2019-11599: The coredump implementation did not use locking or other
mechanisms to prevent vma layout or vma flags changes while it ran, which
allowed local users to obtain sensitive information, cause a denial of
service, or possibly have unspecified other impact by triggering a race
condition with mmget_not_zero or get_task_mm calls. [bnc#1131645].
- CVE-2019-12614: There was an unchecked kstrdup of prop->name on PowerPC
platforms, which allowed an attacker to cause a denial of service (NULL
pointer dereference and system crash). [bnc#1137194]
- CVE-2018-16871: A flaw was found in the NFS implementation. An attacker who
was able to mount an exported NFS filesystem was able to trigger a null
pointer dereference by an invalid NFS sequence. This could panic the machine
and deny access to the NFS server. Any outstanding disk writes to the NFS
server will were lost. [bnc#1137103]
- CVE-2019-12819: The function __mdiobus_register() used to call put_device(),
which would trigger a fixed_mdio_bus_init use-after-free error. This would
cause a denial of service. [bnc#1138291]
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c
may return NULL. If the caller did not check for this, it could trigger a
NULL pointer dereference. This would cause denial of service. [bnc#1138293]
- CVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed
local users to cause a denial of service or possibly have unspecified other
impact by changing the value of ioc_number between two kernel reads of that
value, aka a 'double fetch' vulnerability. [bsc#1136922]
- CVE-2019-12380: An issue was in the EFI subsystem existed that mishandled
memory allocation failures. Note, however, that all relevant code runs only
at boot-time, before any user processes are started. Therefore, there was no
possibility for an unprivileged user to exploit this issue. [bnc#1136598]
The following non-security bugs were fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- acpi: Add Hygon Dhyana support ().
- af_key: unconditionally clone on broadcast (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- asoc: cs42xx8: Add regcache mask dirty (bsc#1051510).
- asoc: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().
- cpufreq: Add Hygon Dhyana support ().
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dm, dax: Fix detection of DAX support (bsc#1139782).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- edac, amd64: Add Hygon Dhyana support.
- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- hid: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- hid: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- hid: wacom: Add support for Pro Pen slim (bsc#1051510).
- hid: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- hid: wacom: Do not report anything prior to the tool entering range (bsc#1051510).
- hid: wacom: Do not set tool type until we're in range (bsc#1051510).
- hid: wacom: Mark expected switch fall-through (bsc#1051510).
- hid: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- hid: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- hid: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- hid: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- hid: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- hid: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- hid: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- hid: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- hid: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- hid: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- hid: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- hid: wacom: fix mistake in printk (bsc#1051510).
- hid: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- hid: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- hid: wacom: generic: Refactor generic battery handling (bsc#1051510).
- hid: wacom: generic: Report AES battery information (bsc#1051510).
- hid: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- hid: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- hid: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- hid: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- hid: wacom: generic: Support multiple tools per report (bsc#1051510).
- hid: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- hid: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- hid: wacom: switch Dell canvas into highres mode (bsc#1051510).
- hid: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().
- hwmon: (k10temp) Add Hygon Dhyana support ().
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().
- hwmon: (k10temp) Add support for family 17h ().
- hwmon: (k10temp) Add support for temperature offsets ().
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().
- hwmon: (k10temp) Correct model name for Ryzen 1600X ().
- hwmon: (k10temp) Display both Tctl and Tdie ().
- hwmon: (k10temp) Fix reading critical temperature register ().
- hwmon: (k10temp) Make function get_raw_temp static ().
- hwmon: (k10temp) Move chip specific code into probe function ().
- hwmon: (k10temp) Only apply temperature offset if result is positive ().
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().
- hwmon: (k10temp) Use API function to access System Management Network ().
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().
- i2c-piix4: Add Hygon Dhyana SMBus support ().
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- kabi workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kabi: fixup blk_mq_register_dev() (bsc#1140637).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kernel-binary: Use -c grep option in klp project detection.
- kernel-binary: fix missing \
- kernel-binary: rpm does not support multiline condition
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- pci: pm: Avoid possible suspend-to-idle issue (bsc#1051510).
- pci: pm: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf tools: Add Hygon Dhyana support ().
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- pm / core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).
- ras/cec: Fix binary search function (bsc#1114279).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.
- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- smb3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi: spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support ().
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- usb: serial: fix initial-termios handling (bsc#1135642).
- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().
- x86/alternative: Init ideal_nops for Hygon Dhyana ().
- x86/amd_nb: Add support for Raven Ridge CPUs ().
- x86/amd_nb: Check vendor in AMD-only functions ().
- x86/apic: Add Hygon Dhyana support ().
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().
- x86/cpu: Create Hygon Dhyana architecture support file ().
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/events: Add Hygon Dhyana support to PMU infrastructure ().
- x86/kvm: Add Hygon Dhyana support to KVM ().
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().
- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/xen: Add Hygon Dhyana support to Xen ().
- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
Patchnames
SUSE-2019-1829,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1829,SUSE-SLE-Module-Public-Cloud-15-2019-1829
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 kernel version 4.12.14 was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-10638: Attackers used to be able to track the Linux kernel by the IP\n ID values the kernel produces for connection-less protocols. When such\n traffic was sent to multiple destination IP addresses, it was possible to\n obtain hash collisions (of indices to the counter array) and thereby obtain\n the hashing key (via enumeration). An attack could have been conducted by\n hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to\n attacker-controlled IP addresses. [bnc#1140575]\n\n- CVE-2019-10639: The Linux kernel used to allow Information Exposure (partial\n kernel address disclosure), leading to a KASLR bypass. Specifically, it was\n possible to extract the KASLR kernel image offset using the IP ID values the\n kernel produces for connection-less protocols. When such traffic was sent to\n multiple destination IP addresses, it was possible to obtain hash collisions\n (of indices to the counter array) and thereby obtain the hashing key (via\n enumeration). This key contains enough bits from a kernel address (of a\n static variable) so when the key was extracted (via enumeration), the offset\n of the kernel image was exposed. This attack could be carried out remotely by\n the attacker forcing the target device to send UDP or ICMP traffic to\n attacker-controlled IP addresses. Forcing a server to send UDP traffic is\n trivial if the server is a DNS server. ICMP traffic is trivial if the server\n answers ICMP Echo requests (ping). For client targets, if the target visits\n the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP\n traffic to attacker-controlled IP addresses. [bnc#1140577]\n\n- CVE-2018-20836: A race condition used to exist in smp_task_timedout() and\n smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a\n use-after-free. [bnc#1134395]\n\n- CVE-2019-10126: A heap based buffer overflow in the wireless driver code was\n fixed. This issue might have lead to memory corruption and possibly other\n consequences. [bnc#1136935]\n\n- CVE-2019-11599: The coredump implementation did not use locking or other\n mechanisms to prevent vma layout or vma flags changes while it ran, which\n allowed local users to obtain sensitive information, cause a denial of\n service, or possibly have unspecified other impact by triggering a race\n condition with mmget_not_zero or get_task_mm calls. [bnc#1131645].\n\n- CVE-2019-12614: There was an unchecked kstrdup of prop-\u003ename on PowerPC\n platforms, which allowed an attacker to cause a denial of service (NULL\n pointer dereference and system crash). [bnc#1137194]\n\n- CVE-2018-16871: A flaw was found in the NFS implementation. An attacker who\n was able to mount an exported NFS filesystem was able to trigger a null\n pointer dereference by an invalid NFS sequence. This could panic the machine\n and deny access to the NFS server. Any outstanding disk writes to the NFS\n server will were lost. [bnc#1137103]\n\n- CVE-2019-12819: The function __mdiobus_register() used to call put_device(),\n which would trigger a fixed_mdio_bus_init use-after-free error. This would\n cause a denial of service. [bnc#1138291]\n\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c\n may return NULL. If the caller did not check for this, it could trigger a\n NULL pointer dereference. This would cause denial of service. [bnc#1138293]\n\n- CVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed\n local users to cause a denial of service or possibly have unspecified other\n impact by changing the value of ioc_number between two kernel reads of that\n value, aka a \u0027double fetch\u0027 vulnerability. [bsc#1136922]\n\n- CVE-2019-12380: An issue was in the EFI subsystem existed that mishandled\n memory allocation failures. Note, however, that all relevant code runs only\n at boot-time, before any user processes are started. Therefore, there was no\n possibility for an unprivileged user to exploit this issue. [bnc#1136598]\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- acpi: Add Hygon Dhyana support ().\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- asoc: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- asoc: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n- cpufreq: Add Hygon Dhyana support ().\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dm, dax: Fix detection of DAX support (bsc#1139782).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- edac, amd64: Add Hygon Dhyana support.\n- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- hid: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- hid: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- hid: wacom: Add support for Pro Pen slim (bsc#1051510).\n- hid: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- hid: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n- hid: wacom: Do not set tool type until we\u0027re in range (bsc#1051510).\n- hid: wacom: Mark expected switch fall-through (bsc#1051510).\n- hid: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- hid: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- hid: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- hid: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- hid: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- hid: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- hid: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- hid: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- hid: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- hid: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hid: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- hid: wacom: fix mistake in printk (bsc#1051510).\n- hid: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- hid: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- hid: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- hid: wacom: generic: Report AES battery information (bsc#1051510).\n- hid: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- hid: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- hid: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- hid: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- hid: wacom: generic: Support multiple tools per report (bsc#1051510).\n- hid: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- hid: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- hid: wacom: switch Dell canvas into highres mode (bsc#1051510).\n- hid: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().\n- hwmon: (k10temp) Add Hygon Dhyana support ().\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().\n- hwmon: (k10temp) Add support for family 17h ().\n- hwmon: (k10temp) Add support for temperature offsets ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().\n- hwmon: (k10temp) Correct model name for Ryzen 1600X ().\n- hwmon: (k10temp) Display both Tctl and Tdie ().\n- hwmon: (k10temp) Fix reading critical temperature register ().\n- hwmon: (k10temp) Make function get_raw_temp static ().\n- hwmon: (k10temp) Move chip specific code into probe function ().\n- hwmon: (k10temp) Only apply temperature offset if result is positive ().\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().\n- hwmon: (k10temp) Use API function to access System Management Network ().\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().\n- i2c-piix4: Add Hygon Dhyana SMBus support ().\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- kabi workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kabi: fixup blk_mq_register_dev() (bsc#1140637).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kernel-binary: Use -c grep option in klp project detection.\n- kernel-binary: fix missing \\\n- kernel-binary: rpm does not support multiline condition\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- pci: pm: Avoid possible suspend-to-idle issue (bsc#1051510).\n- pci: pm: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf tools: Add Hygon Dhyana support ().\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- pm / core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).\n- ras/cec: Fix binary search function (bsc#1114279).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- smb3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi: spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support ().\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- usb: serial: fix initial-termios handling (bsc#1135642).\n- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/alternative: Init ideal_nops for Hygon Dhyana ().\n- x86/amd_nb: Add support for Raven Ridge CPUs ().\n- x86/amd_nb: Check vendor in AMD-only functions ().\n- x86/apic: Add Hygon Dhyana support ().\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n- x86/cpu: Create Hygon Dhyana architecture support file ().\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n- x86/kvm: Add Hygon Dhyana support to KVM ().\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/xen: Add Hygon Dhyana support to Xen ().\n- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1829,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1829,SUSE-SLE-Module-Public-Cloud-15-2019-1829", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1829-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1829-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191829-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1829-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1106751", "url": "https://bugzilla.suse.com/1106751" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1124167", "url": "https://bugzilla.suse.com/1124167" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1128910", "url": "https://bugzilla.suse.com/1128910" }, { "category": "self", "summary": "SUSE Bug 1131645", "url": "https://bugzilla.suse.com/1131645" }, { "category": "self", "summary": "SUSE Bug 1132154", "url": "https://bugzilla.suse.com/1132154" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136598", "url": "https://bugzilla.suse.com/1136598" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1136935", "url": "https://bugzilla.suse.com/1136935" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137995", "url": "https://bugzilla.suse.com/1137995" }, { "category": "self", "summary": "SUSE Bug 1137996", "url": "https://bugzilla.suse.com/1137996" }, { "category": "self", "summary": "SUSE Bug 1137998", "url": "https://bugzilla.suse.com/1137998" }, { "category": "self", "summary": "SUSE Bug 1137999", "url": "https://bugzilla.suse.com/1137999" }, { "category": "self", "summary": "SUSE Bug 1138000", "url": "https://bugzilla.suse.com/1138000" }, { "category": "self", "summary": "SUSE Bug 1138002", "url": "https://bugzilla.suse.com/1138002" }, { "category": "self", "summary": "SUSE Bug 1138003", "url": "https://bugzilla.suse.com/1138003" }, { "category": "self", "summary": "SUSE Bug 1138005", "url": "https://bugzilla.suse.com/1138005" }, { "category": "self", "summary": "SUSE Bug 1138006", "url": "https://bugzilla.suse.com/1138006" }, { "category": "self", "summary": "SUSE Bug 1138007", "url": "https://bugzilla.suse.com/1138007" }, { "category": "self", "summary": "SUSE Bug 1138008", "url": "https://bugzilla.suse.com/1138008" }, { "category": "self", "summary": "SUSE Bug 1138009", "url": "https://bugzilla.suse.com/1138009" }, { "category": "self", "summary": "SUSE Bug 1138010", "url": "https://bugzilla.suse.com/1138010" }, { "category": "self", "summary": "SUSE Bug 1138011", "url": "https://bugzilla.suse.com/1138011" }, { "category": "self", "summary": "SUSE Bug 1138012", "url": "https://bugzilla.suse.com/1138012" }, { "category": "self", "summary": "SUSE Bug 1138013", "url": "https://bugzilla.suse.com/1138013" }, { "category": "self", "summary": "SUSE Bug 1138014", "url": "https://bugzilla.suse.com/1138014" }, { "category": "self", "summary": "SUSE Bug 1138015", "url": "https://bugzilla.suse.com/1138015" }, { "category": "self", "summary": "SUSE Bug 1138016", "url": "https://bugzilla.suse.com/1138016" }, { "category": "self", "summary": "SUSE Bug 1138017", "url": "https://bugzilla.suse.com/1138017" }, { "category": "self", "summary": "SUSE Bug 1138018", "url": "https://bugzilla.suse.com/1138018" }, { "category": "self", "summary": "SUSE Bug 1138019", "url": "https://bugzilla.suse.com/1138019" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139782", "url": "https://bugzilla.suse.com/1139782" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10126 page", "url": "https://www.suse.com/security/cve/CVE-2019-10126/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12380 page", "url": "https://www.suse.com/security/cve/CVE-2019-12380/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-12T09:45:18Z", "generator": { "date": "2019-07-12T09:45:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1829-1", "initial_release_date": "2019-07-12T09:45:18Z", "revision_history": [ { "date": "2019-07-12T09:45:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-5.33.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-5.33.1.noarch", "product_id": "kernel-devel-azure-4.12.14-5.33.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-5.33.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-5.33.1.noarch", "product_id": "kernel-source-azure-4.12.14-5.33.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-5.33.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-5.33.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-5.33.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-5.33.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-5.33.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-5.33.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-5.33.1.x86_64", "product": { "name": "kernel-azure-4.12.14-5.33.1.x86_64", "product_id": "kernel-azure-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-5.33.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-5.33.1.x86_64", "product_id": "kernel-azure-base-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-5.33.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-5.33.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-5.33.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-5.33.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-4.12.14-5.33.1.x86_64", "product": { "name": "kernel-azure-livepatch-4.12.14-5.33.1.x86_64", "product_id": "kernel-azure-livepatch-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-5.33.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-5.33.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-5.33.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-5.33.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-5.33.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-5.33.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-5.33.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-5.33.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-5.33.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-5.33.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-5.33.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-5.33.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-5.33.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-5.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-5.33.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-5.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-5.33.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-5.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-5.33.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-5.33.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-5.33.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-5.33.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-5.33.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-5.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2019-10126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10126" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10126", "url": "https://www.suse.com/security/cve/CVE-2019-10126" }, { "category": "external", "summary": "SUSE Bug 1136935 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1136935" }, { "category": "external", "summary": "SUSE Bug 1137944 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1137944" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "important" } ], "title": "CVE-2019-10126" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-12380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12380" } ], "notes": [ { "category": "general", "text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12380", "url": "https://www.suse.com/security/cve/CVE-2019-12380" }, { "category": "external", "summary": "SUSE Bug 1136598 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1136598" }, { "category": "external", "summary": "SUSE Bug 1155298 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1155298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "low" } ], "title": "CVE-2019-12380" }, { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-12T09:45:18Z", "details": "low" } ], "title": "CVE-2019-12819" } ] }
suse-su-2019:1855-1
Vulnerability from csaf_suse
Published
2019-07-15 15:13
Modified
2019-07-15 15:13
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel version 4.12.14 was updated to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-10638: Attackers used to be able to track the Linux kernel by the IP
ID values the kernel produces for connection-less protocols. When such
traffic was sent to multiple destination IP addresses, it was possible to
obtain hash collisions (of indices to the counter array) and thereby obtain
the hashing key (via enumeration). An attack could have been conducted by
hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to
attacker-controlled IP addresses. [bnc#1140575]
- CVE-2019-10639: The Linux kernel used to allow Information Exposure (partial
kernel address disclosure), leading to a KASLR bypass. Specifically, it was
possible to extract the KASLR kernel image offset using the IP ID values the
kernel produces for connection-less protocols. When such traffic was sent to
multiple destination IP addresses, it was possible to obtain hash collisions
(of indices to the counter array) and thereby obtain the hashing key (via
enumeration). This key contains enough bits from a kernel address (of a
static variable) so when the key was extracted (via enumeration), the offset
of the kernel image was exposed. This attack could be carried out remotely by
the attacker forcing the target device to send UDP or ICMP traffic to
attacker-controlled IP addresses. Forcing a server to send UDP traffic is
trivial if the server is a DNS server. ICMP traffic is trivial if the server
answers ICMP Echo requests (ping). For client targets, if the target visits
the attacker's web page, then WebRTC or gQUIC can be used to force UDP
traffic to attacker-controlled IP addresses. [bnc#1140577]
- CVE-2018-20836: A race condition used to exist in smp_task_timedout() and
smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a
use-after-free. [bnc#1134395]
- CVE-2019-10126: A heap based buffer overflow in the wireless driver code was
fixed. This issue might have lead to memory corruption and possibly other
consequences. [bnc#1136935]
- CVE-2019-11599: The coredump implementation did not use locking or other
mechanisms to prevent vma layout or vma flags changes while it ran, which
allowed local users to obtain sensitive information, cause a denial of
service, or possibly have unspecified other impact by triggering a race
condition with mmget_not_zero or get_task_mm calls. [bnc#1131645].
- CVE-2019-12614: There was an unchecked kstrdup of prop->name on PowerPC
platforms, which allowed an attacker to cause a denial of service (NULL
pointer dereference and system crash). [bnc#1137194]
- CVE-2018-16871: A flaw was found in the NFS implementation. An attacker who
was able to mount an exported NFS filesystem was able to trigger a null
pointer dereference by an invalid NFS sequence. This could panic the machine
and deny access to the NFS server. Any outstanding disk writes to the NFS
server will were lost. [bnc#1137103]
- CVE-2019-12819: The function __mdiobus_register() used to call put_device(),
which would trigger a fixed_mdio_bus_init use-after-free error. This would
cause a denial of service. [bnc#1138291]
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c
may return NULL. If the caller did not check for this, it could trigger a
NULL pointer dereference. This would cause denial of service. [bnc#1138293]
- CVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed
local users to cause a denial of service or possibly have unspecified other
impact by changing the value of ioc_number between two kernel reads of that
value, aka a 'double fetch' vulnerability. [bsc#1136922]
- CVE-2019-12380: An issue was in the EFI subsystem existed that mishandled
memory allocation failures. Note, however, that all relevant code runs only
at boot-time, before any user processes are started. Therefore, there was no
possibility for an unprivileged user to exploit this issue. [bnc#1136598]
The following non-security bugs were fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- ACPI / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).
- ACPI: Add Hygon Dhyana support ().
- ALSA: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- ALSA: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- ALSA: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- ALSA: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- ALSA: hda/realtek - Set default power save node to 0 (bsc#1051510).
- ALSA: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- ALSA: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- ALSA: line6: Fix write on zero-sized buffer (bsc#1051510).
- ALSA: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- ALSA: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- ALSA: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).
- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).
- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).
- Add kernel-subpackage-build.spec (). - add kernel-subpackage-build.spec.in and support scripts - hook it in mkspec - extend the mechanism that copies dependencies inside kernel-binary.spec.in from kernel-%build_flavor to kernel-%build_flavor-base to also handle kernel-subpackage-build.spec.in using BINARY DEPS marker. - expand %name in kernel-%build_flavor so the dependencies are expanded correctly in kernel-subpackage-build.spec.in
- Add sample kernel-default-base spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- Bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- Build klp-symbols in kernel devel projects.
- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).
- Do not provide kernel-default-srchash from kernel-default-base.
- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).
- Documentation: Correct the possible MDS sysfs values (bsc#1135642).
- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- EDAC, amd64: Add Hygon Dhyana support ().
- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).
- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).
- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- HID: wacom: Add support for Pro Pen slim (bsc#1051510).
- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- HID: wacom: Do not report anything prior to the tool entering range (bsc#1051510).
- HID: wacom: Do not set tool type until we're in range (bsc#1051510).
- HID: wacom: Mark expected switch fall-through (bsc#1051510).
- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- HID: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- HID: wacom: fix mistake in printk (bsc#1051510).
- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).
- HID: wacom: generic: Report AES battery information (bsc#1051510).
- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- HID: wacom: generic: Support multiple tools per report (bsc#1051510).
- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- HID: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- Install extra rpm scripts for kernel subpackaging (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).
- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).
- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).
- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).
- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).
- KVM: PPC: Validate all tces before updating tables (bsc#1061840).
- Kabi fixup blk_mq_register_dev() (bsc#1140637).
- Move stuff git_sort chokes on, out of the way
- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- PM / core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).
- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).
- RAS/CEC: Fix binary search function (bsc#1114279).
- SMB3: Fix endian warning (bsc#1137884).
- Staging: vc04_services: Fix a couple error codes (bsc#1051510).
- Trim build dependencies of sample subpackage spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).
- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).
- USB: core: Do not unbind interfaces following device reset failure (bsc#1051510).
- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).
- USB: rio500: refuse more than one device at a time (bsc#1051510).
- USB: serial: fix initial-termios handling (bsc#1135642).
- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- USB: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).
- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- added De0-Nanos-SoC board support (and others based on Altera SOC).
- af_key: unconditionally clone on broadcast (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).
- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).
- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).
- brcmfmac: fix missing checks for kmemdup (bsc#1051510).
- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- chardev: add additional check for minor range overlap (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().
- cpufreq: Add Hygon Dhyana support ().
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dm, dax: Fix detection of DAX support (bsc#1139782).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).
- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).
- fuse: fallocate: fix return with locked inode (bsc#1051510).
- fuse: fix writepages on 32bit (bsc#1051510).
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).
- gpio: fix gpio-adp5588 build errors (bsc#1051510).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (core) add thermal sensors only if dev->of_node is present (bsc#1051510).
- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().
- hwmon: (k10temp) Add Hygon Dhyana support ().
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().
- hwmon: (k10temp) Add support for family 17h ().
- hwmon: (k10temp) Add support for temperature offsets ().
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().
- hwmon: (k10temp) Correct model name for Ryzen 1600X ().
- hwmon: (k10temp) Display both Tctl and Tdie ().
- hwmon: (k10temp) Fix reading critical temperature register ().
- hwmon: (k10temp) Make function get_raw_temp static ().
- hwmon: (k10temp) Move chip specific code into probe function ().
- hwmon: (k10temp) Only apply temperature offset if result is positive ().
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().
- hwmon: (k10temp) Use API function to access System Management Network ().
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().
- hwrng: omap - Set default quality (bsc#1051510).
- i2c-piix4: Add Hygon Dhyana SMBus support ().
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).
- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).
- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).
- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).
- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).
- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kernel-binary: Use -c grep option in klp project detection.
- kernel-binary: fix missing \
- kernel-binary: rpm does not support multiline condition
- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751). In factory packages are not rebuilt automatically so a dependency is needed on the old kernel to get a rebuild with the new kernel. THe subpackage itself cannot depend on the kernel so add another empty pacakge that does depend on it.
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- leds: avoid flush_work in atomic context (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).
- media: au0828: stop video streaming only when last user stops (bsc#1051510).
- media: coda: clear error return value before picture run (bsc#1051510).
- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).
- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).
- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).
- media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).
- media: saa7146: avoid high stack usage with clang (bsc#1051510).
- media: smsusb: better handle optional alignment (bsc#1051510).
- media: usb: siano: Fix false-positive 'uninitialized variable' warning (bsc#1051510).
- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: Verify SD bus width (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).
- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).
- perf tools: Add Hygon Dhyana support ().
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).
- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).
- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.
- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- sort patches to proper position
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).
- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- tcp: refine memory limit test in tcp_fragment() (CVE-2019-11478, bsc#1139751).
- test_firmware: Use correct snprintf() limit (bsc#1135642).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support ().
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).
- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).
- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).
- usbnet: fix kernel crash after disconnect (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- vxlan: trivial indenting fix (bsc#1051510).
- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).
- w1: fix the resume command API (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().
- x86/alternative: Init ideal_nops for Hygon Dhyana ().
- x86/amd_nb: Add support for Raven Ridge CPUs ().
- x86/amd_nb: Check vendor in AMD-only functions ().
- x86/apic: Add Hygon Dhyana support ().
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().
- x86/cpu: Create Hygon Dhyana architecture support file ().
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/events: Add Hygon Dhyana support to PMU infrastructure ().
- x86/kvm: Add Hygon Dhyana support to KVM ().
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().
- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/xen: Add Hygon Dhyana support to Xen ().
- xen/pciback: Do not disable PCI_COMMAND on PCI device reset (bsc#1065600).
- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).
- xhci: Use %zu for printing size_t type (bsc#1051510).
- xhci: update bounce buffer with correct sg num (bsc#1051510).
Patchnames
SUSE-2019-1855,SUSE-SLE-Module-Basesystem-15-2019-1855,SUSE-SLE-Module-Development-Tools-15-2019-1855,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1855,SUSE-SLE-Module-Legacy-15-2019-1855,SUSE-SLE-Module-Live-Patching-15-2019-1855,SUSE-SLE-Product-HA-15-2019-1855,SUSE-SLE-Product-WE-15-2019-1855
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 kernel version 4.12.14 was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-10638: Attackers used to be able to track the Linux kernel by the IP\n ID values the kernel produces for connection-less protocols. When such\n traffic was sent to multiple destination IP addresses, it was possible to\n obtain hash collisions (of indices to the counter array) and thereby obtain\n the hashing key (via enumeration). An attack could have been conducted by\n hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to\n attacker-controlled IP addresses. [bnc#1140575]\n\n- CVE-2019-10639: The Linux kernel used to allow Information Exposure (partial\n kernel address disclosure), leading to a KASLR bypass. Specifically, it was\n possible to extract the KASLR kernel image offset using the IP ID values the\n kernel produces for connection-less protocols. When such traffic was sent to\n multiple destination IP addresses, it was possible to obtain hash collisions\n (of indices to the counter array) and thereby obtain the hashing key (via\n enumeration). This key contains enough bits from a kernel address (of a\n static variable) so when the key was extracted (via enumeration), the offset\n of the kernel image was exposed. This attack could be carried out remotely by\n the attacker forcing the target device to send UDP or ICMP traffic to\n attacker-controlled IP addresses. Forcing a server to send UDP traffic is\n trivial if the server is a DNS server. ICMP traffic is trivial if the server\n answers ICMP Echo requests (ping). For client targets, if the target visits\n the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP\n traffic to attacker-controlled IP addresses. [bnc#1140577]\n\n- CVE-2018-20836: A race condition used to exist in smp_task_timedout() and\n smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a\n use-after-free. [bnc#1134395]\n\n- CVE-2019-10126: A heap based buffer overflow in the wireless driver code was\n fixed. This issue might have lead to memory corruption and possibly other\n consequences. [bnc#1136935]\n\n- CVE-2019-11599: The coredump implementation did not use locking or other\n mechanisms to prevent vma layout or vma flags changes while it ran, which\n allowed local users to obtain sensitive information, cause a denial of\n service, or possibly have unspecified other impact by triggering a race\n condition with mmget_not_zero or get_task_mm calls. [bnc#1131645].\n\n- CVE-2019-12614: There was an unchecked kstrdup of prop-\u003ename on PowerPC\n platforms, which allowed an attacker to cause a denial of service (NULL\n pointer dereference and system crash). [bnc#1137194]\n\n- CVE-2018-16871: A flaw was found in the NFS implementation. An attacker who\n was able to mount an exported NFS filesystem was able to trigger a null\n pointer dereference by an invalid NFS sequence. This could panic the machine\n and deny access to the NFS server. Any outstanding disk writes to the NFS\n server will were lost. [bnc#1137103]\n\n- CVE-2019-12819: The function __mdiobus_register() used to call put_device(),\n which would trigger a fixed_mdio_bus_init use-after-free error. This would\n cause a denial of service. [bnc#1138291]\n\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c\n may return NULL. If the caller did not check for this, it could trigger a\n NULL pointer dereference. This would cause denial of service. [bnc#1138293]\n\n- CVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed\n local users to cause a denial of service or possibly have unspecified other\n impact by changing the value of ioc_number between two kernel reads of that\n value, aka a \u0027double fetch\u0027 vulnerability. [bsc#1136922]\n\n- CVE-2019-12380: An issue was in the EFI subsystem existed that mishandled\n memory allocation failures. Note, however, that all relevant code runs only\n at boot-time, before any user processes are started. Therefore, there was no\n possibility for an unprivileged user to exploit this issue. [bnc#1136598]\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- ACPI / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- ACPI: Add Hygon Dhyana support ().\n- ALSA: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- ALSA: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- ALSA: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- ALSA: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- ALSA: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- ALSA: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- ALSA: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- ALSA: line6: Fix write on zero-sized buffer (bsc#1051510).\n- ALSA: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- ALSA: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- ALSA: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- Add kernel-subpackage-build.spec (). - add kernel-subpackage-build.spec.in and support scripts - hook it in mkspec - extend the mechanism that copies dependencies inside kernel-binary.spec.in from kernel-%build_flavor to kernel-%build_flavor-base to also handle kernel-subpackage-build.spec.in using BINARY DEPS marker. - expand %name in kernel-%build_flavor so the dependencies are expanded correctly in kernel-subpackage-build.spec.in\n- Add sample kernel-default-base spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- Bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- Build klp-symbols in kernel devel projects.\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not provide kernel-default-srchash from kernel-default-base.\n- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- Documentation: Correct the possible MDS sysfs values (bsc#1135642).\n- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- EDAC, amd64: Add Hygon Dhyana support ().\n- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Do not set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- Install extra rpm scripts for kernel subpackaging (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- Kabi fixup blk_mq_register_dev() (bsc#1140637).\n- Move stuff git_sort chokes on, out of the way\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- PM / core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- RAS/CEC: Fix binary search function (bsc#1114279).\n- SMB3: Fix endian warning (bsc#1137884).\n- Staging: vc04_services: Fix a couple error codes (bsc#1051510).\n- Trim build dependencies of sample subpackage spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- USB: core: Do not unbind interfaces following device reset failure (bsc#1051510).\n- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- USB: rio500: refuse more than one device at a time (bsc#1051510).\n- USB: serial: fix initial-termios handling (bsc#1135642).\n- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- USB: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- added De0-Nanos-SoC board support (and others based on Altera SOC).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n- cpufreq: Add Hygon Dhyana support ().\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dm, dax: Fix detection of DAX support (bsc#1139782).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (core) add thermal sensors only if dev-\u003eof_node is present (bsc#1051510).\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().\n- hwmon: (k10temp) Add Hygon Dhyana support ().\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().\n- hwmon: (k10temp) Add support for family 17h ().\n- hwmon: (k10temp) Add support for temperature offsets ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().\n- hwmon: (k10temp) Correct model name for Ryzen 1600X ().\n- hwmon: (k10temp) Display both Tctl and Tdie ().\n- hwmon: (k10temp) Fix reading critical temperature register ().\n- hwmon: (k10temp) Make function get_raw_temp static ().\n- hwmon: (k10temp) Move chip specific code into probe function ().\n- hwmon: (k10temp) Only apply temperature offset if result is positive ().\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().\n- hwmon: (k10temp) Use API function to access System Management Network ().\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().\n- hwrng: omap - Set default quality (bsc#1051510).\n- i2c-piix4: Add Hygon Dhyana SMBus support ().\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kernel-binary: Use -c grep option in klp project detection.\n- kernel-binary: fix missing \\\n- kernel-binary: rpm does not support multiline condition\n- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751). In factory packages are not rebuilt automatically so a dependency is needed on the old kernel to get a rebuild with the new kernel. THe subpackage itself cannot depend on the kernel so add another empty pacakge that does depend on it.\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- perf tools: Add Hygon Dhyana support ().\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- sort patches to proper position\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: refine memory limit test in tcp_fragment() (CVE-2019-11478, bsc#1139751).\n- test_firmware: Use correct snprintf() limit (bsc#1135642).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support ().\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/alternative: Init ideal_nops for Hygon Dhyana ().\n- x86/amd_nb: Add support for Raven Ridge CPUs ().\n- x86/amd_nb: Check vendor in AMD-only functions ().\n- x86/apic: Add Hygon Dhyana support ().\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n- x86/cpu: Create Hygon Dhyana architecture support file ().\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n- x86/kvm: Add Hygon Dhyana support to KVM ().\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/xen: Add Hygon Dhyana support to Xen ().\n- xen/pciback: Do not disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1855,SUSE-SLE-Module-Basesystem-15-2019-1855,SUSE-SLE-Module-Development-Tools-15-2019-1855,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1855,SUSE-SLE-Module-Legacy-15-2019-1855,SUSE-SLE-Module-Live-Patching-15-2019-1855,SUSE-SLE-Product-HA-15-2019-1855,SUSE-SLE-Product-WE-15-2019-1855", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1855-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1855-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191855-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1855-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1106751", "url": "https://bugzilla.suse.com/1106751" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1124167", "url": "https://bugzilla.suse.com/1124167" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1128910", "url": "https://bugzilla.suse.com/1128910" }, { "category": "self", "summary": "SUSE Bug 1131645", "url": "https://bugzilla.suse.com/1131645" }, { "category": "self", "summary": "SUSE Bug 1132154", "url": "https://bugzilla.suse.com/1132154" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136598", "url": "https://bugzilla.suse.com/1136598" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1136935", "url": "https://bugzilla.suse.com/1136935" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137995", "url": "https://bugzilla.suse.com/1137995" }, { "category": "self", "summary": "SUSE Bug 1137996", "url": "https://bugzilla.suse.com/1137996" }, { "category": "self", "summary": "SUSE Bug 1137998", "url": "https://bugzilla.suse.com/1137998" }, { "category": "self", "summary": "SUSE Bug 1137999", "url": "https://bugzilla.suse.com/1137999" }, { "category": "self", "summary": "SUSE Bug 1138000", "url": "https://bugzilla.suse.com/1138000" }, { "category": "self", "summary": "SUSE Bug 1138002", "url": "https://bugzilla.suse.com/1138002" }, { "category": "self", "summary": "SUSE Bug 1138003", "url": "https://bugzilla.suse.com/1138003" }, { "category": "self", "summary": "SUSE Bug 1138005", "url": "https://bugzilla.suse.com/1138005" }, { "category": "self", "summary": "SUSE Bug 1138006", "url": "https://bugzilla.suse.com/1138006" }, { "category": "self", "summary": "SUSE Bug 1138007", "url": "https://bugzilla.suse.com/1138007" }, { "category": "self", "summary": "SUSE Bug 1138008", "url": "https://bugzilla.suse.com/1138008" }, { "category": "self", "summary": "SUSE Bug 1138009", "url": "https://bugzilla.suse.com/1138009" }, { "category": "self", "summary": "SUSE Bug 1138010", "url": "https://bugzilla.suse.com/1138010" }, { "category": "self", "summary": "SUSE Bug 1138011", "url": "https://bugzilla.suse.com/1138011" }, { "category": "self", "summary": "SUSE Bug 1138012", "url": "https://bugzilla.suse.com/1138012" }, { "category": "self", "summary": "SUSE Bug 1138013", "url": "https://bugzilla.suse.com/1138013" }, { "category": "self", "summary": "SUSE Bug 1138014", "url": "https://bugzilla.suse.com/1138014" }, { "category": "self", "summary": "SUSE Bug 1138015", "url": "https://bugzilla.suse.com/1138015" }, { "category": "self", "summary": "SUSE Bug 1138016", "url": "https://bugzilla.suse.com/1138016" }, { "category": "self", "summary": "SUSE Bug 1138017", "url": "https://bugzilla.suse.com/1138017" }, { "category": "self", "summary": "SUSE Bug 1138018", "url": "https://bugzilla.suse.com/1138018" }, { "category": "self", "summary": "SUSE Bug 1138019", "url": "https://bugzilla.suse.com/1138019" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139782", "url": "https://bugzilla.suse.com/1139782" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10126 page", "url": "https://www.suse.com/security/cve/CVE-2019-10126/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12380 page", "url": "https://www.suse.com/security/cve/CVE-2019-12380/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-15T15:13:21Z", "generator": { "date": "2019-07-15T15:13:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1855-1", "initial_release_date": "2019-07-15T15:13:21Z", "revision_history": [ { "date": "2019-07-15T15:13:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.27.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.27.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-al-4.12.14-150.27.1.aarch64", "product_id": "dtb-al-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-150.27.1.aarch64", "product_id": "dtb-allwinner-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-altera-4.12.14-150.27.1.aarch64", "product_id": "dtb-altera-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-amd-4.12.14-150.27.1.aarch64", "product_id": "dtb-amd-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-150.27.1.aarch64", "product_id": "dtb-amlogic-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-apm-4.12.14-150.27.1.aarch64", "product_id": "dtb-apm-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-arm-4.12.14-150.27.1.aarch64", "product_id": "dtb-arm-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-150.27.1.aarch64", "product_id": "dtb-broadcom-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-150.27.1.aarch64", "product_id": "dtb-cavium-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-150.27.1.aarch64", "product_id": "dtb-exynos-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-150.27.1.aarch64", "product_id": "dtb-freescale-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-150.27.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-lg-4.12.14-150.27.1.aarch64", "product_id": "dtb-lg-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-150.27.1.aarch64", "product_id": "dtb-marvell-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-150.27.1.aarch64", "product_id": "dtb-mediatek-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-150.27.1.aarch64", "product_id": "dtb-nvidia-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-150.27.1.aarch64", "product_id": "dtb-qcom-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-150.27.1.aarch64", "product_id": "dtb-renesas-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-150.27.1.aarch64", "product_id": "dtb-rockchip-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-150.27.1.aarch64", "product_id": "dtb-socionext-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-150.27.1.aarch64", "product_id": "dtb-sprd-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-150.27.1.aarch64", "product_id": "dtb-xilinx-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-150.27.1.aarch64", "product": { "name": "dtb-zte-4.12.14-150.27.1.aarch64", "product_id": "dtb-zte-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.27.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.27.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.27.1.aarch64", "product_id": "kernel-default-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.27.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.27.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.27.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.27.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.27.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.27.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.27.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.27.1.aarch64", "product_id": "kernel-syms-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.27.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.27.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.27.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.27.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.27.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.27.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.27.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.27.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.27.1.noarch", "product_id": "kernel-devel-4.12.14-150.27.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.27.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.27.1.noarch", "product_id": "kernel-docs-4.12.14-150.27.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.27.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.27.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.27.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.27.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.27.1.noarch", "product_id": "kernel-macros-4.12.14-150.27.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.27.1.noarch", "product": { "name": "kernel-source-4.12.14-150.27.1.noarch", "product_id": "kernel-source-4.12.14-150.27.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.27.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.27.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.27.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.27.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.27.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.27.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.27.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.27.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.27.1.ppc64le", "product_id": "kernel-default-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.27.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.27.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.27.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.27.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.27.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.27.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.27.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.27.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.27.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.27.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.27.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.27.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.27.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.27.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.27.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.27.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.27.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.27.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.27.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.27.1.s390x", "product": { "name": "kernel-default-4.12.14-150.27.1.s390x", "product_id": "kernel-default-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.27.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.27.1.s390x", "product_id": "kernel-default-base-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.27.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.27.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.27.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.27.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.27.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.27.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.27.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.27.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.27.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.27.1.s390x", "product_id": "kernel-default-man-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.27.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.27.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.27.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.27.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.27.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.27.1.s390x", "product_id": "kernel-syms-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.27.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.27.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.27.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.27.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.27.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.27.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.27.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.27.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.27.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.27.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.27.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.27.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.27.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.27.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.27.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.27.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.27.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.27.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.27.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.27.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.27.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.27.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.27.1.x86_64", "product_id": "kernel-debug-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.27.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.27.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.27.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.27.1.x86_64", "product_id": "kernel-default-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.27.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.27.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.27.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.27.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.27.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.27.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.27.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.27.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.27.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.27.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.27.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.27.1.x86_64", "product_id": "kernel-syms-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.27.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.27.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.27.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.27.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.27.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.27.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.27.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.27.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.27.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.27.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.27.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.27.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.27.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-150.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-150.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2019-10126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10126" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10126", "url": "https://www.suse.com/security/cve/CVE-2019-10126" }, { "category": "external", "summary": "SUSE Bug 1136935 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1136935" }, { "category": "external", "summary": "SUSE Bug 1137944 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1137944" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "important" } ], "title": "CVE-2019-10126" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-12380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12380" } ], "notes": [ { "category": "general", "text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12380", "url": "https://www.suse.com/security/cve/CVE-2019-12380" }, { "category": "external", "summary": "SUSE Bug 1136598 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1136598" }, { "category": "external", "summary": "SUSE Bug 1155298 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1155298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "low" } ], "title": "CVE-2019-12380" }, { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.27.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T15:13:21Z", "details": "low" } ], "title": "CVE-2019-12819" } ] }
suse-su-2019:1744-1
Vulnerability from csaf_suse
Published
2019-07-04 08:37
Modified
2019-07-04 08:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
This update adds support for the Hygon Dhyana CPU (fate#327735).
The following security bugs were fixed:
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).
- CVE-2019-12817: On the PowerPC architecture, local attackers could access other users processes memory (bnc#1138263).
The following non-security bugs were fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- acpi: Add Hygon Dhyana support (fate#327735).
- af_key: unconditionally clone on broadcast (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).
- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- ceph: factor out ceph_lookup_inode() (bsc#1138681).
- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- ceph: quota: fix quota subdir mounts (bsc#1138681).
- ceph: remove duplicated filelock ref increase (bsc#1138681).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- cpufreq: Add Hygon Dhyana support (fate#327735).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ (fate#327735).
- cpu/topology: Export die_id (jsc#SLE-5454).
- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).
- drm/amd/display: Use plane->color_space for dpp if specified (bsc#1111666).
- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).
- drm/i915: Add new AML_ULX support list (jsc#SLE-4986).
- drm/i915: Add new ICL PCI ID (jsc#SLE-4986).
- drm/i915/aml: Add new Amber Lake PCI ID (jsc#SLE-4986).
- drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).
- drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).
- drm/i915/cfl: Adding another PCI Device ID (jsc#SLE-4986).
- drm/i915/cml: Add CML PCI IDS (jsc#SLE-4986).
- drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).
- drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).
- drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).
- drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).
- drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).
- drm/i915: Split some PCI ids into separate groups (jsc#SLE-4986).
- drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).
- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).
- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).
- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).
- drm/mediatek: fix unbind functions (bsc#1111666).
- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).
- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).
- EDAC, amd64: Add Hygon Dhyana support (fate#327735).
- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- HID: wacom: Add support for Pro Pen slim (bsc#1051510).
- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- HID: wacom: Do not report anything prior to the tool entering range (bsc#1051510).
- HID: wacom: Do not set tool type until we're in range (bsc#1051510).
- HID: wacom: fix mistake in printk (bsc#1051510).
- HID: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).
- HID: wacom: generic: Report AES battery information (bsc#1051510).
- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- HID: wacom: generic: Support multiple tools per report (bsc#1051510).
- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- HID: wacom: Mark expected switch fall-through (bsc#1051510).
- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- HID: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).
- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).
- hwmon: (k10temp) Add support for family 17h (FATE#327735).
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).
- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).
- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).
- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).
- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).
- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).
- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).
- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).
- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).
- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).
- kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 FATE#327056).
- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).
- kabi: s390: enum interruption_class (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- kabi/severities: Whitelist airq_iv_* (s390-specific)
- kABI workaround for asus-wmi changes (bsc#1051510).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).
- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).
- nl80211: fix station_info pertid memory leak (bsc#1051510).
- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- PCI: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).
- PCI/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803 FATE#327056).
- PCI/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803 FATE#327056).
- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- perf tools: Add Hygon Dhyana support (fate#327735).
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).
- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).
- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).
- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).
- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).
- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_pmc_core: Add ICL platform support (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Add Package cstates residency info (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Avoid a u32 overflow (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Include Reserved IP for LTR (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Mark local function static (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Quirk to ignore XTAL shutdown (jsc#SLE-5226).
- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).
- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).
- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).
- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).
- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).
- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).
- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).
- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).
- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).
- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).
- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).
- platform/x86: mlx-platform: Remove unused define (bsc#1112374).
- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).
- PM / core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).
- RAS/CEC: Fix binary search function (bsc#1114279).
- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).
- Revert 'ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops' (bsc#1051510).
- Revert 'HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range' (bsc#1051510).
- Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).' This broke the build with older gcc instead.
- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/airq: recognize directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390: enable processes for mio instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: fix assignment of bus resources (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: fix struct definition for set PCI function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: improve bar check (jsc#SLE-5803 FATE#327056).
- s390/pci: map IOV resources (jsc#SLE-5803 FATE#327056).
- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: provide support for MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: remove stale rc (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: remove unused define (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: skip VF scanning (jsc#SLE-5803 FATE#327056).
- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/sclp: detect DIRQ facility (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/setup: fix early warning messages (bsc#1051510).
- s390: show statistics for MSI IRQs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).
- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).
- scsi: megaraid_sas: correct an info message (bsc#1136271).
- scsi: megaraid_sas: driver version update (bsc#1136271).
- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).
- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).
- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).
- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- SMB3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support (fate#327735).
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- x86/alternative: Init ideal_nops for Hygon Dhyana (fate#327735).
- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).
- x86/amd_nb: Check vendor in AMD-only functions (fate#327735).
- x86/apic: Add Hygon Dhyana support (fate#327735).
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery (fate#327735).
- x86/cpu: Add Icelake model number (jsc#SLE-5226).
- x86/cpu/amd: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/cpu: Create Hygon Dhyana architecture support file (fate#327735).
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana (fate#327735).
- x86/cpu/hygon: Fix phys_proc_id calculation logic for multi-die processors ().
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number (fate#327735).
- x86/events: Add Hygon Dhyana support to PMU infrastructure (fate#327735).
- x86/kvm: Add Hygon Dhyana support to KVM (fate#327735).
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure (fate#327735).
- x86/mce: Do not disable MCA banks when offlining a CPU on AMD (fate#327735).
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge (fate#327735).
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana (fate#327735).
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/umip: Make the UMIP activated message generic (bsc#1138336).
- x86/umip: Print UMIP line only once (bsc#1138336).
- x86/xen: Add Hygon Dhyana support to Xen (fate#327735).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).
Patchnames
SUSE-2019-1744,SUSE-SLE-Module-Basesystem-15-SP1-2019-1744,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1744,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1744,SUSE-SLE-Module-Legacy-15-SP1-2019-1744,SUSE-SLE-Module-Live-Patching-15-SP1-2019-1744,SUSE-SLE-Product-HA-15-SP1-2019-1744,SUSE-SLE-Product-WE-15-SP1-2019-1744
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThis update adds support for the Hygon Dhyana CPU (fate#327735).\n\nThe following security bugs were fixed:\n\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).\n- CVE-2019-12817: On the PowerPC architecture, local attackers could access other users processes memory (bnc#1138263).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- acpi: Add Hygon Dhyana support (fate#327735).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- ceph: factor out ceph_lookup_inode() (bsc#1138681).\n- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).\n- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).\n- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).\n- ceph: quota: fix quota subdir mounts (bsc#1138681).\n- ceph: remove duplicated filelock ref increase (bsc#1138681).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cpufreq: Add Hygon Dhyana support (fate#327735).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ (fate#327735).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).\n- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).\n- drm/amd/display: Use plane-\u003ecolor_space for dpp if specified (bsc#1111666).\n- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).\n- drm/i915: Add new AML_ULX support list (jsc#SLE-4986).\n- drm/i915: Add new ICL PCI ID (jsc#SLE-4986).\n- drm/i915/aml: Add new Amber Lake PCI ID (jsc#SLE-4986).\n- drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).\n- drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).\n- drm/i915/cfl: Adding another PCI Device ID (jsc#SLE-4986).\n- drm/i915/cml: Add CML PCI IDS (jsc#SLE-4986).\n- drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).\n- drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).\n- drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).\n- drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).\n- drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).\n- drm/i915: Split some PCI ids into separate groups (jsc#SLE-4986).\n- drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).\n- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).\n- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).\n- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).\n- drm/mediatek: fix unbind functions (bsc#1111666).\n- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).\n- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).\n- EDAC, amd64: Add Hygon Dhyana support (fate#327735).\n- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Do not set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).\n- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).\n- hwmon: (k10temp) Add support for family 17h (FATE#327735).\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).\n- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).\n- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).\n- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).\n- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).\n- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).\n- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).\n- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).\n- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).\n- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).\n- kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 FATE#327056).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- kabi/severities: Whitelist airq_iv_* (s390-specific)\n- kABI workaround for asus-wmi changes (bsc#1051510).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).\n- nl80211: fix station_info pertid memory leak (bsc#1051510).\n- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- PCI: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).\n- PCI/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803 FATE#327056).\n- PCI/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803 FATE#327056).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- perf tools: Add Hygon Dhyana support (fate#327735).\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).\n- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).\n- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).\n- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).\n- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).\n- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_pmc_core: Add ICL platform support (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Add Package cstates residency info (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Avoid a u32 overflow (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Include Reserved IP for LTR (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Mark local function static (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Quirk to ignore XTAL shutdown (jsc#SLE-5226).\n- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).\n- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).\n- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).\n- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).\n- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).\n- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).\n- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).\n- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).\n- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).\n- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).\n- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).\n- platform/x86: mlx-platform: Remove unused define (bsc#1112374).\n- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).\n- PM / core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- RAS/CEC: Fix binary search function (bsc#1114279).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- Revert \u0027ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Revert \u0027HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range\u0027 (bsc#1051510).\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027 This broke the build with older gcc instead.\n- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/airq: recognize directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390: enable processes for mio instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: fix assignment of bus resources (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: fix struct definition for set PCI function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: improve bar check (jsc#SLE-5803 FATE#327056).\n- s390/pci: map IOV resources (jsc#SLE-5803 FATE#327056).\n- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: provide support for MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: remove stale rc (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: remove unused define (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: skip VF scanning (jsc#SLE-5803 FATE#327056).\n- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/sclp: detect DIRQ facility (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390: show statistics for MSI IRQs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).\n- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).\n- scsi: megaraid_sas: correct an info message (bsc#1136271).\n- scsi: megaraid_sas: driver version update (bsc#1136271).\n- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).\n- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).\n- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).\n- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- SMB3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support (fate#327735).\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- x86/alternative: Init ideal_nops for Hygon Dhyana (fate#327735).\n- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).\n- x86/amd_nb: Check vendor in AMD-only functions (fate#327735).\n- x86/apic: Add Hygon Dhyana support (fate#327735).\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery (fate#327735).\n- x86/cpu: Add Icelake model number (jsc#SLE-5226).\n- x86/cpu/amd: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/cpu: Create Hygon Dhyana architecture support file (fate#327735).\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana (fate#327735).\n- x86/cpu/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number (fate#327735).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure (fate#327735).\n- x86/kvm: Add Hygon Dhyana support to KVM (fate#327735).\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure (fate#327735).\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD (fate#327735).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge (fate#327735).\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana (fate#327735).\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/umip: Make the UMIP activated message generic (bsc#1138336).\n- x86/umip: Print UMIP line only once (bsc#1138336).\n- x86/xen: Add Hygon Dhyana support to Xen (fate#327735).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1744,SUSE-SLE-Module-Basesystem-15-SP1-2019-1744,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1744,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1744,SUSE-SLE-Module-Legacy-15-SP1-2019-1744,SUSE-SLE-Module-Live-Patching-15-SP1-2019-1744,SUSE-SLE-Product-HA-15-SP1-2019-1744,SUSE-SLE-Product-WE-15-SP1-2019-1744", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1744-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1744-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191744-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1744-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1134730", "url": "https://bugzilla.suse.com/1134730" }, { "category": "self", "summary": "SUSE Bug 1134738", "url": "https://bugzilla.suse.com/1134738" }, { "category": "self", "summary": "SUSE Bug 1135153", "url": "https://bugzilla.suse.com/1135153" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1136156", "url": "https://bugzilla.suse.com/1136156" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136271", "url": "https://bugzilla.suse.com/1136271" }, { "category": "self", "summary": "SUSE Bug 1136333", "url": "https://bugzilla.suse.com/1136333" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137985", "url": "https://bugzilla.suse.com/1137985" }, { "category": "self", "summary": "SUSE Bug 1138263", "url": "https://bugzilla.suse.com/1138263" }, { "category": "self", "summary": "SUSE Bug 1138336", "url": "https://bugzilla.suse.com/1138336" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138681", "url": "https://bugzilla.suse.com/1138681" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1138732", "url": "https://bugzilla.suse.com/1138732" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12817 page", "url": "https://www.suse.com/security/cve/CVE-2019-12817/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-04T08:37:42Z", "generator": { "date": "2019-07-04T08:37:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1744-1", "initial_release_date": "2019-07-04T08:37:42Z", "revision_history": [ { "date": "2019-07-04T08:37:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.7.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.7.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-al-4.12.14-197.7.1.aarch64", "product_id": "dtb-al-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-197.7.1.aarch64", "product_id": "dtb-allwinner-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-altera-4.12.14-197.7.1.aarch64", "product_id": "dtb-altera-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-amd-4.12.14-197.7.1.aarch64", "product_id": "dtb-amd-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-197.7.1.aarch64", "product_id": "dtb-amlogic-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-apm-4.12.14-197.7.1.aarch64", "product_id": "dtb-apm-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-arm-4.12.14-197.7.1.aarch64", "product_id": "dtb-arm-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-197.7.1.aarch64", "product_id": "dtb-broadcom-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-197.7.1.aarch64", "product_id": "dtb-cavium-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-197.7.1.aarch64", "product_id": "dtb-exynos-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-197.7.1.aarch64", "product_id": "dtb-freescale-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-197.7.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-lg-4.12.14-197.7.1.aarch64", "product_id": "dtb-lg-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-197.7.1.aarch64", "product_id": "dtb-marvell-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-197.7.1.aarch64", "product_id": "dtb-mediatek-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-197.7.1.aarch64", "product_id": "dtb-nvidia-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-197.7.1.aarch64", "product_id": "dtb-qcom-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-197.7.1.aarch64", "product_id": "dtb-renesas-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-197.7.1.aarch64", "product_id": "dtb-rockchip-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-197.7.1.aarch64", "product_id": "dtb-socionext-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-197.7.1.aarch64", "product_id": "dtb-sprd-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-197.7.1.aarch64", "product_id": "dtb-xilinx-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-197.7.1.aarch64", "product": { "name": "dtb-zte-4.12.14-197.7.1.aarch64", "product_id": "dtb-zte-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.7.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.7.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.7.1.aarch64", "product_id": "kernel-default-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.7.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.7.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.7.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.7.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.7.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.7.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.7.1.aarch64", "product_id": "kernel-syms-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.7.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.7.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.7.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.7.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.7.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.7.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.7.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.7.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.7.1.noarch", "product_id": "kernel-devel-4.12.14-197.7.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.7.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.7.1.noarch", "product_id": "kernel-docs-4.12.14-197.7.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.7.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.7.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.7.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.7.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.7.1.noarch", "product_id": "kernel-macros-4.12.14-197.7.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.7.1.noarch", "product": { "name": "kernel-source-4.12.14-197.7.1.noarch", "product_id": "kernel-source-4.12.14-197.7.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.7.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.7.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.7.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.7.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.7.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.7.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.7.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.7.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.7.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.7.1.ppc64le", "product_id": "kernel-default-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.7.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.7.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.7.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.7.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.7.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.7.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.7.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.7.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.7.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.7.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.7.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.7.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.7.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.7.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.7.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.7.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.7.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.7.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.7.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.7.1.s390x", "product": { "name": "kernel-default-4.12.14-197.7.1.s390x", "product_id": "kernel-default-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.7.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.7.1.s390x", "product_id": "kernel-default-base-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.7.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.7.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.7.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.7.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.7.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.7.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.7.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.7.1.s390x", "product_id": "kernel-default-man-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.7.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.7.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.7.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.7.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.7.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.7.1.s390x", "product_id": "kernel-syms-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.7.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.7.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.7.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.7.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.7.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.7.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.7.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.7.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.7.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.7.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.7.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.7.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.7.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.7.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.7.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.7.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.7.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.7.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.7.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.7.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.7.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.7.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.7.1.x86_64", "product_id": "kernel-debug-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.7.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.7.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.7.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.7.1.x86_64", "product_id": "kernel-default-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.7.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.7.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.7.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.7.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.7.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.7.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.7.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.7.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.7.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.7.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.7.1.x86_64", "product_id": "kernel-syms-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.7.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.7.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.7.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.7.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.7.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.7.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.7.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.7.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.7.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.7.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.7.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-197.7.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-197.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-04T08:37:42Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-04T08:37:42Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12817" } ], "notes": [ { "category": "general", "text": "arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12817", "url": "https://www.suse.com/security/cve/CVE-2019-12817" }, { "category": "external", "summary": "SUSE Bug 1138263 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138263" }, { "category": "external", "summary": "SUSE Bug 1138264 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.7.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-04T08:37:42Z", "details": "important" } ], "title": "CVE-2019-12817" } ] }
suse-su-2019:3246-1
Vulnerability from csaf_suse
Published
2019-12-11 10:04
Modified
2019-12-11 10:04
Summary
Security update for the Linux Kernel (Live Patch 8 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 8 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-25_28 fixes several issues.
The following security issues were fixed:
- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a
null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server
(bsc#1156320).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
Patchnames
SUSE-2019-3246,SUSE-SLE-Module-Live-Patching-15-2019-3246
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-25_28 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a \n null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server\n (bsc#1156320).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-3246,SUSE-SLE-Module-Live-Patching-15-2019-3246", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3246-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:3246-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193246-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:3246-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" }, { "category": "self", "summary": "SUSE Bug 1153108", "url": "https://bugzilla.suse.com/1153108" }, { "category": "self", "summary": "SUSE Bug 1156320", "url": "https://bugzilla.suse.com/1156320" }, { "category": "self", "summary": "SUSE Bug 1156321", "url": "https://bugzilla.suse.com/1156321" }, { "category": "self", "summary": "SUSE Bug 1156334", "url": "https://bugzilla.suse.com/1156334" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13272 page", "url": "https://www.suse.com/security/cve/CVE-2019-13272/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15917 page", "url": "https://www.suse.com/security/cve/CVE-2019-15917/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 15)", "tracking": { "current_release_date": "2019-12-11T10:04:48Z", "generator": { "date": "2019-12-11T10:04:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:3246-1", "initial_release_date": "2019-12-11T10:04:48Z", "revision_history": [ { "date": "2019-12-11T10:04:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "product_id": "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", "product": { "name": "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", "product_id": "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:04:48Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:04:48Z", "details": "moderate" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-13272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13272" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13272", "url": "https://www.suse.com/security/cve/CVE-2019-13272" }, { "category": "external", "summary": "SUSE Bug 1140671 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1140671" }, { "category": "external", "summary": "SUSE Bug 1156321 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1156321" }, { "category": "external", "summary": "SUSE Bug 1198122 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1198122" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:04:48Z", "details": "moderate" } ], "title": "CVE-2019-13272" }, { "cve": "CVE-2019-15917", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15917" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15917", "url": "https://www.suse.com/security/cve/CVE-2019-15917" }, { "category": "external", "summary": "SUSE Bug 1149539 for CVE-2019-15917", "url": "https://bugzilla.suse.com/1149539" }, { "category": "external", "summary": "SUSE Bug 1156334 for CVE-2019-15917", "url": "https://bugzilla.suse.com/1156334" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-11T10:04:48Z", "details": "important" } ], "title": "CVE-2019-15917" } ] }
suse-su-2019:1851-1
Vulnerability from csaf_suse
Published
2019-07-15 14:00
Modified
2019-07-15 14:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-10638: A device could have been tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image was exposed. This attack could have been carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic was trivial if the server answered ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. (bnc#1140577)
- CVE-2018-20836: A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead to a use-after-free. (bnc#1134395)
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12614: An unchecked kstrdup might have allowed an attacker to cause denial of service (a NULL pointer dereference and system crash). (bnc#1137194)
- CVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device() which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bnc#1138293)
The following non-security bugs were fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).
- acpi: Add Hygon Dhyana support
- af_key: unconditionally clone on broadcast (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- asoc: cs42xx8: Add regcache mask dirty (bsc#1051510).
- asoc: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- asoc: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- asoc: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).
- asoc: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- asoc: hdmi-codec: unlock the device on startup errors (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bluetooth: Replace the bluetooth fix with the upstream commit (bsc#1135556)
- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).
- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).
- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).
- brcmfmac: fix missing checks for kmemdup (bsc#1051510).
- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- chardev: add additional check for minor range overlap (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().
- cpufreq: Add Hygon Dhyana support ().
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dm, dax: Fix detection of DAX support (bsc#1139782).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).
- documentation: Correct the possible MDS sysfs values (bsc#1135642).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).
- edac, amd64: Add Hygon Dhyana support ().
- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).
- fuse: fallocate: fix return with locked inode (bsc#1051510).
- fuse: fix writepages on 32bit (bsc#1051510).
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).
- gpio: fix gpio-adp5588 build errors (bsc#1051510).
- hid: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- hid: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).
- hid: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).
- hid: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- hid: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- hid: wacom: Add support for Pro Pen slim (bsc#1051510).
- hid: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- hid: wacom: Do not report anything prior to the tool entering range (bsc#1051510).
- hid: wacom: Do not set tool type until we're in range (bsc#1051510).
- hid: wacom: Mark expected switch fall-through (bsc#1051510).
- hid: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- hid: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- hid: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- hid: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- hid: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- hid: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- hid: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- hid: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- hid: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- hid: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- hid: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- hid: wacom: fix mistake in printk (bsc#1051510).
- hid: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- hid: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- hid: wacom: generic: Refactor generic battery handling (bsc#1051510).
- hid: wacom: generic: Report AES battery information (bsc#1051510).
- hid: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- hid: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- hid: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- hid: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- hid: wacom: generic: Support multiple tools per report (bsc#1051510).
- hid: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- hid: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- hid: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (core) add thermal sensors only if dev->of_node is present (bsc#1051510).
- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().
- hwmon: (k10temp) Add Hygon Dhyana support ().
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().
- hwmon: (k10temp) Add support for family 17h ().
- hwmon: (k10temp) Add support for temperature offsets ().
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().
- hwmon: (k10temp) Correct model name for Ryzen 1600X ().
- hwmon: (k10temp) Display both Tctl and Tdie ().
- hwmon: (k10temp) Fix reading critical temperature register ().
- hwmon: (k10temp) Make function get_raw_temp static ().
- hwmon: (k10temp) Move chip specific code into probe function ().
- hwmon: (k10temp) Only apply temperature offset if result is positive ().
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().
- hwmon: (k10temp) Use API function to access System Management Network ().
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().
- hwrng: omap - Set default quality (bsc#1051510).
- i2c-piix4: Add Hygon Dhyana SMBus support ().
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).
- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).
- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).
- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).
- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).
- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kernel-binary: Use -c grep option in klp project detection.
- kernel-binary: fix missing \
- kernel-binary: rpm does not support multiline condition
- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751). In factory packages are not rebuilt automatically so a dependency is needed on the old kernel to get a rebuild with the new kernel. THe subpackage itself cannot depend on the kernel so add another empty pacakge that does depend on it.
- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- kmps: provide and conflict a kernel version specific KMP name (bsc#1127155, bsc#1109137).
- kvm: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).
- kvm: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).
- kvm: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).
- kvm: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).
- kvm: PPC: Remove redundand permission bits removal (bsc#1061840).
- kvm: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).
- kvm: PPC: Validate all tces before updating tables (bsc#1061840).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- leds: avoid flush_work in atomic context (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).
- media: au0828: stop video streaming only when last user stops (bsc#1051510).
- media: coda: clear error return value before picture run (bsc#1051510).
- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).
- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).
- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).
- media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).
- media: saa7146: avoid high stack usage with clang (bsc#1051510).
- media: smsusb: better handle optional alignment (bsc#1051510).
- media: usb: siano: Fix false-positive 'uninitialized variable' warning (bsc#1051510).
- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mm: pagechage-limit: Calculate pagecache-limit based on node state (bsc#1136811)
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: Verify SD bus width (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).
- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).
- pci: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf tools: Add Hygon Dhyana support ().
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- pm/core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).
- ras/cec: Fix binary search function (bsc#1114279).
- rpm/dtb.spec.in.in: Fix new include path Commit 89de3db69113d58cdab14d2c777de6080eac49dc ('rpm/dtb.spec.in.in: Update include path for dt-bindings') introduced an additional include path for 4.12. The commit message had it correct, but the spec file template lacked a path component, breaking the aarch64 build while succeeding on armv7hl. Fix that.
- rpm/dtb.spec.in.in: Update include path for dt-bindings Kernels before 4.12 had arch/{arm,arm64}/boot/dts/include/ directories with a symlink to include/dt-bindings/. In 4.12 those include/ directories were dropped. Therefore use include/ directly. Additionally some cross-architecture .dtsi reuse was introduced, which requires scripts/dtc/include-prefixes/ that didn't exist on older kernels.
- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).
- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).
- rpm/kernel-subpackage-build: handle arm kernel zImage.
- rpm/kernel-subpackage-spec: only provide firmware actually present in subpackage.
- rpm/package-descriptions: fix typo in kernel-azure
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- rpm: Add arm64 dtb-allwinner subpackage 4.10 added arch/arm64/boot/dts/allwinner/.
- rpm: Add arm64 dtb-zte subpackage 4.9 added arch/arm64/boot/dts/zte/.
- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).
- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).
- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).
- s390: fix booting problem (bsc#1140948).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.
- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- smb3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).
- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- test_firmware: Use correct snprintf() limit (bsc#1135642).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support ().
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).
- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).
- usb: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).
- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- usb: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).
- usb: core: Do not unbind interfaces following device reset failure (bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- usb: rio500: fix memory leak in close after disconnect (bsc#1051510).
- usb: rio500: refuse more than one device at a time (bsc#1051510).
- usb: serial: fix initial-termios handling (bsc#1135642).
- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- usb: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).
- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).
- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).
- usbnet: fix kernel crash after disconnect (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- vxlan: trivial indenting fix (bsc#1051510).
- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).
- w1: fix the resume command API (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().
- x86/alternative: Init ideal_nops for Hygon Dhyana ().
- x86/amd_nb: Add support for Raven Ridge CPUs ().
- x86/amd_nb: Check vendor in AMD-only functions ().
- x86/apic: Add Hygon Dhyana support ().
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().
- x86/cpu: Create Hygon Dhyana architecture support file ().
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/events: Add Hygon Dhyana support to PMU infrastructure ().
- x86/kvm: Add Hygon Dhyana support to KVM ().
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().
- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/xen: Add Hygon Dhyana support to Xen ().
- xen/pciback: Do not disable PCI_COMMAND on PCI device reset (bsc#1065600).
- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).
- xhci: Use %zu for printing size_t type (bsc#1051510).
- xhci: update bounce buffer with correct sg num (bsc#1051510).
Patchnames
SUSE-2019-1851,SUSE-SLE-DESKTOP-12-SP4-2019-1851,SUSE-SLE-HA-12-SP4-2019-1851,SUSE-SLE-Live-Patching-12-SP4-2019-1851,SUSE-SLE-SDK-12-SP4-2019-1851,SUSE-SLE-SERVER-12-SP4-2019-1851,SUSE-SLE-WE-12-SP4-2019-1851
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-10638: A device could have been tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)\n- CVE-2019-10639: Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image was exposed. This attack could have been carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic was trivial if the server answered ICMP Echo requests (ping). For client targets, if the target visited the attacker\u0027s web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. (bnc#1140577)\n- CVE-2018-20836: A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead to a use-after-free. (bnc#1134395)\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)\n- CVE-2019-12614: An unchecked kstrdup might have allowed an attacker to cause denial of service (a NULL pointer dereference and system crash). (bnc#1137194)\n- CVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device() which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bnc#1138293)\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- acpi: Add Hygon Dhyana support\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- asoc: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- asoc: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- asoc: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- asoc: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- asoc: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- asoc: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bluetooth: Replace the bluetooth fix with the upstream commit (bsc#1135556)\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n- cpufreq: Add Hygon Dhyana support ().\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dm, dax: Fix detection of DAX support (bsc#1139782).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n- documentation: Correct the possible MDS sysfs values (bsc#1135642).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- edac, amd64: Add Hygon Dhyana support ().\n- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- hid: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- hid: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- hid: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- hid: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- hid: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- hid: wacom: Add support for Pro Pen slim (bsc#1051510).\n- hid: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- hid: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n- hid: wacom: Do not set tool type until we\u0027re in range (bsc#1051510).\n- hid: wacom: Mark expected switch fall-through (bsc#1051510).\n- hid: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- hid: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- hid: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- hid: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- hid: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- hid: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- hid: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- hid: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- hid: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- hid: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hid: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- hid: wacom: fix mistake in printk (bsc#1051510).\n- hid: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- hid: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- hid: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- hid: wacom: generic: Report AES battery information (bsc#1051510).\n- hid: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- hid: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- hid: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- hid: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- hid: wacom: generic: Support multiple tools per report (bsc#1051510).\n- hid: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- hid: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- hid: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (core) add thermal sensors only if dev-\u003eof_node is present (bsc#1051510).\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().\n- hwmon: (k10temp) Add Hygon Dhyana support ().\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().\n- hwmon: (k10temp) Add support for family 17h ().\n- hwmon: (k10temp) Add support for temperature offsets ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().\n- hwmon: (k10temp) Correct model name for Ryzen 1600X ().\n- hwmon: (k10temp) Display both Tctl and Tdie ().\n- hwmon: (k10temp) Fix reading critical temperature register ().\n- hwmon: (k10temp) Make function get_raw_temp static ().\n- hwmon: (k10temp) Move chip specific code into probe function ().\n- hwmon: (k10temp) Only apply temperature offset if result is positive ().\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().\n- hwmon: (k10temp) Use API function to access System Management Network ().\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().\n- hwrng: omap - Set default quality (bsc#1051510).\n- i2c-piix4: Add Hygon Dhyana SMBus support ().\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kernel-binary: Use -c grep option in klp project detection.\n- kernel-binary: fix missing \\\n- kernel-binary: rpm does not support multiline condition\n- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751). In factory packages are not rebuilt automatically so a dependency is needed on the old kernel to get a rebuild with the new kernel. THe subpackage itself cannot depend on the kernel so add another empty pacakge that does depend on it.\n- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- kmps: provide and conflict a kernel version specific KMP name (bsc#1127155, bsc#1109137).\n- kvm: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- kvm: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- kvm: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- kvm: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- kvm: PPC: Remove redundand permission bits removal (bsc#1061840).\n- kvm: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- kvm: PPC: Validate all tces before updating tables (bsc#1061840).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mm: pagechage-limit: Calculate pagecache-limit based on node state (bsc#1136811)\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- pci: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf tools: Add Hygon Dhyana support ().\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- pm/core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).\n- ras/cec: Fix binary search function (bsc#1114279).\n- rpm/dtb.spec.in.in: Fix new include path Commit 89de3db69113d58cdab14d2c777de6080eac49dc (\u0027rpm/dtb.spec.in.in: Update include path for dt-bindings\u0027) introduced an additional include path for 4.12. The commit message had it correct, but the spec file template lacked a path component, breaking the aarch64 build while succeeding on armv7hl. Fix that.\n- rpm/dtb.spec.in.in: Update include path for dt-bindings Kernels before 4.12 had arch/{arm,arm64}/boot/dts/include/ directories with a symlink to include/dt-bindings/. In 4.12 those include/ directories were dropped. Therefore use include/ directly. Additionally some cross-architecture .dtsi reuse was introduced, which requires scripts/dtc/include-prefixes/ that didn\u0027t exist on older kernels.\n- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).\n- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).\n- rpm/kernel-subpackage-build: handle arm kernel zImage.\n- rpm/kernel-subpackage-spec: only provide firmware actually present in subpackage.\n- rpm/package-descriptions: fix typo in kernel-azure\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rpm: Add arm64 dtb-allwinner subpackage 4.10 added arch/arm64/boot/dts/allwinner/.\n- rpm: Add arm64 dtb-zte subpackage 4.9 added arch/arm64/boot/dts/zte/.\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- s390: fix booting problem (bsc#1140948).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- smb3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- test_firmware: Use correct snprintf() limit (bsc#1135642).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support ().\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- usb: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- usb: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- usb: core: Do not unbind interfaces following device reset failure (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- usb: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- usb: rio500: refuse more than one device at a time (bsc#1051510).\n- usb: serial: fix initial-termios handling (bsc#1135642).\n- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- usb: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/alternative: Init ideal_nops for Hygon Dhyana ().\n- x86/amd_nb: Add support for Raven Ridge CPUs ().\n- x86/amd_nb: Check vendor in AMD-only functions ().\n- x86/apic: Add Hygon Dhyana support ().\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n- x86/cpu: Create Hygon Dhyana architecture support file ().\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n- x86/kvm: Add Hygon Dhyana support to KVM ().\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/xen: Add Hygon Dhyana support to Xen ().\n- xen/pciback: Do not disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1851,SUSE-SLE-DESKTOP-12-SP4-2019-1851,SUSE-SLE-HA-12-SP4-2019-1851,SUSE-SLE-Live-Patching-12-SP4-2019-1851,SUSE-SLE-SDK-12-SP4-2019-1851,SUSE-SLE-SERVER-12-SP4-2019-1851,SUSE-SLE-WE-12-SP4-2019-1851", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1851-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1851-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1851-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1106751", "url": "https://bugzilla.suse.com/1106751" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1124167", "url": "https://bugzilla.suse.com/1124167" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1128910", "url": "https://bugzilla.suse.com/1128910" }, { "category": "self", "summary": "SUSE Bug 1132154", "url": "https://bugzilla.suse.com/1132154" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136811", "url": "https://bugzilla.suse.com/1136811" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137221", "url": "https://bugzilla.suse.com/1137221" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137995", "url": "https://bugzilla.suse.com/1137995" }, { "category": "self", "summary": "SUSE Bug 1137996", "url": "https://bugzilla.suse.com/1137996" }, { "category": "self", "summary": "SUSE Bug 1137998", "url": "https://bugzilla.suse.com/1137998" }, { "category": "self", "summary": "SUSE Bug 1137999", "url": "https://bugzilla.suse.com/1137999" }, { "category": "self", "summary": "SUSE Bug 1138000", "url": "https://bugzilla.suse.com/1138000" }, { "category": "self", "summary": "SUSE Bug 1138002", "url": "https://bugzilla.suse.com/1138002" }, { "category": "self", "summary": "SUSE Bug 1138003", "url": "https://bugzilla.suse.com/1138003" }, { "category": "self", "summary": "SUSE Bug 1138005", "url": "https://bugzilla.suse.com/1138005" }, { "category": "self", "summary": "SUSE Bug 1138006", "url": "https://bugzilla.suse.com/1138006" }, { "category": "self", "summary": "SUSE Bug 1138007", "url": "https://bugzilla.suse.com/1138007" }, { "category": "self", "summary": "SUSE Bug 1138008", "url": "https://bugzilla.suse.com/1138008" }, { "category": "self", "summary": "SUSE Bug 1138009", "url": "https://bugzilla.suse.com/1138009" }, { "category": "self", "summary": "SUSE Bug 1138010", "url": "https://bugzilla.suse.com/1138010" }, { "category": "self", "summary": "SUSE Bug 1138011", "url": "https://bugzilla.suse.com/1138011" }, { "category": "self", "summary": "SUSE Bug 1138012", "url": "https://bugzilla.suse.com/1138012" }, { "category": "self", "summary": "SUSE Bug 1138013", "url": "https://bugzilla.suse.com/1138013" }, { "category": "self", "summary": "SUSE Bug 1138014", "url": "https://bugzilla.suse.com/1138014" }, { "category": "self", "summary": "SUSE Bug 1138015", "url": "https://bugzilla.suse.com/1138015" }, { "category": "self", "summary": "SUSE Bug 1138016", "url": "https://bugzilla.suse.com/1138016" }, { "category": "self", "summary": "SUSE Bug 1138017", "url": "https://bugzilla.suse.com/1138017" }, { "category": "self", "summary": "SUSE Bug 1138018", "url": "https://bugzilla.suse.com/1138018" }, { "category": "self", "summary": "SUSE Bug 1138019", "url": "https://bugzilla.suse.com/1138019" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139782", "url": "https://bugzilla.suse.com/1139782" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 821419", "url": "https://bugzilla.suse.com/821419" }, { "category": "self", "summary": "SUSE Bug 945811", "url": "https://bugzilla.suse.com/945811" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10126 page", "url": "https://www.suse.com/security/cve/CVE-2019-10126/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-15T14:00:22Z", "generator": { "date": "2019-07-15T14:00:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1851-1", "initial_release_date": "2019-07-15T14:00:22Z", "revision_history": [ { "date": "2019-07-15T14:00:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.24.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.24.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.24.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.24.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-al-4.12.14-95.24.1.aarch64", "product_id": "dtb-al-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-95.24.1.aarch64", "product_id": "dtb-allwinner-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-altera-4.12.14-95.24.1.aarch64", "product_id": "dtb-altera-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-amd-4.12.14-95.24.1.aarch64", "product_id": "dtb-amd-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-95.24.1.aarch64", "product_id": "dtb-amlogic-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-apm-4.12.14-95.24.1.aarch64", "product_id": "dtb-apm-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-arm-4.12.14-95.24.1.aarch64", "product_id": "dtb-arm-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-95.24.1.aarch64", "product_id": "dtb-broadcom-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-95.24.1.aarch64", "product_id": "dtb-cavium-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-95.24.1.aarch64", "product_id": "dtb-exynos-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-95.24.1.aarch64", "product_id": "dtb-freescale-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-95.24.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-lg-4.12.14-95.24.1.aarch64", "product_id": "dtb-lg-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-95.24.1.aarch64", "product_id": "dtb-marvell-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-95.24.1.aarch64", "product_id": "dtb-mediatek-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-95.24.1.aarch64", "product_id": "dtb-nvidia-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-95.24.1.aarch64", "product_id": "dtb-qcom-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-95.24.1.aarch64", "product_id": "dtb-renesas-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-95.24.1.aarch64", "product_id": "dtb-rockchip-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-95.24.1.aarch64", "product_id": "dtb-socionext-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-95.24.1.aarch64", "product_id": "dtb-sprd-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-95.24.1.aarch64", "product_id": "dtb-xilinx-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-95.24.1.aarch64", "product": { "name": "dtb-zte-4.12.14-95.24.1.aarch64", "product_id": "dtb-zte-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.24.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.24.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.24.1.aarch64", "product_id": "kernel-default-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.24.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.24.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.24.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.24.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.24.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.24.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.24.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.24.1.aarch64", "product_id": "kernel-syms-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.24.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.24.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.24.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.24.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.24.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.24.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.24.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.24.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.24.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.24.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.24.1.noarch", "product_id": "kernel-devel-4.12.14-95.24.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.24.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.24.1.noarch", "product_id": "kernel-docs-4.12.14-95.24.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.24.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.24.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.24.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.24.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.24.1.noarch", "product_id": "kernel-macros-4.12.14-95.24.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.24.1.noarch", "product": { "name": "kernel-source-4.12.14-95.24.1.noarch", "product_id": "kernel-source-4.12.14-95.24.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.24.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.24.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.24.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.24.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.24.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.24.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.24.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.24.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.24.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.24.1.ppc64le", "product_id": "kernel-default-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.24.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.24.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.24.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.24.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.24.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.24.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.24.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.24.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.24.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.24.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.24.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.24.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.24.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.24.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.24.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.24.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.24.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.24.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.24.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.24.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.24.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.24.1.s390x", "product": { "name": "kernel-default-4.12.14-95.24.1.s390x", "product_id": "kernel-default-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.24.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.24.1.s390x", "product_id": "kernel-default-base-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.24.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.24.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.24.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.24.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.24.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.24.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.24.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.24.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.24.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.24.1.s390x", "product_id": "kernel-default-man-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.24.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.24.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.24.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.24.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.24.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.24.1.s390x", "product_id": "kernel-syms-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.24.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.24.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.24.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.24.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.24.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.24.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.24.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.24.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.24.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.24.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.24.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.24.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.24.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.24.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.24.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.24.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.24.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.24.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.24.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.24.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.24.1.x86_64", "product_id": "kernel-debug-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.24.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.24.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.24.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.24.1.x86_64", "product_id": "kernel-default-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.24.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.24.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.24.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.24.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.24.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.24.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.24.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.24.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.24.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.24.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.24.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.24.1.x86_64", "product_id": "kernel-syms-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.24.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.24.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.24.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.24.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.24.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.24.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-docs-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.24.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.24.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2019-10126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10126" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10126", "url": "https://www.suse.com/security/cve/CVE-2019-10126" }, { "category": "external", "summary": "SUSE Bug 1136935 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1136935" }, { "category": "external", "summary": "SUSE Bug 1137944 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1137944" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "important" } ], "title": "CVE-2019-10126" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.24.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.24.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-15T14:00:22Z", "details": "low" } ], "title": "CVE-2019-12819" } ] }
suse-su-2019:2450-1
Vulnerability from csaf_suse
Published
2019-09-24 11:56
Modified
2019-09-24 11:56
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise Server 12 SP4 Realtime Kernel was updated to fix bugs and security issues.
Security issues fixed:
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).
- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-1125: Enable Spectre v1 mitigations for SWAPGS (bsc#1139358).
- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)
- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#1140577)
- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586)
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#1136598)
- CVE-2019-12456: a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)
- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)
Other issues fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- Abort file_remove_privs() for non-reg. files (bsc#1140888).
- acpi: Add Hygon Dhyana support (fate#327735).
- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).
- Add back sibling paca poiter to paca (bsc#1055117).
- added De0-Nanos-SoC board support (and others based on Altera SOC).
- Add kernel-subpackage-build.spec (FATE#326579).
- Add sample kernel-default-base spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- Add support for crct10dif-vpmsum (FATE#327696).
- Add version information to KLP_SYMBOLS file
- af_key: unconditionally clone on broadcast (bsc#1051510).
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Don't allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).
- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).
- arm64: fix acpi dependencies (bsc#1117158).
- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).
- arm64/x86: Update config files.
- ASoC : cs4265 : readable register too low (bsc#1051510).
- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).
- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).
- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).
- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath6kl: add some bounds checking (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: don't set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- Bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).
- brcmfmac: fix missing checks for kmemdup (bsc#1051510).
- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).
- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).
- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- Build klp-symbols in kernel devel projects.
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- chardev: add additional check for minor range overlap (bsc#1051510).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Don't yell about bad mmc phases when getting (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coredump: fix race condition between collapse_huge_page() and core dumping (bnc#1133738, CVE-2019-11599).
- coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (bsc#1133738, CVE-2019-11599).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189)
- Correct the patch reference tag for scsi fix (bsc#1136922 CVE-2019-12456)
- cpufreq: acpi-cpufreq: Report if CPU doesn't support boost technologies (bsc#1051510).
- cpufreq: Add Hygon Dhyana support (fate#327735).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ (fate#327735).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp - fix the SEV probe in kexec boot path (bsc#1136896).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#11123080).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- dm, dax: Fix detection of DAX support (bsc#1139782).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).
- Documentation: Add MDS vulnerability documentation (bsc#1135642).
- Documentation: Correct the possible MDS sysfs values (bsc#1135642).
- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).
- Do not provide kernel-default-srchash from kernel-default-base.
- Don't restrict NFSv4.2 on openSUSE (bsc#1138719).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: thermal: tsens: Don't print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/gvt: refine ggtt range validation (bsc#1113722)
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/nouveau/i2c: Disable i2c bus access after ->fini() (bsc#1113722)
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- edac, amd64: Add Hygon Dhyana support (fate#327735).
- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).
- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).
- efi/arm: Don't mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: libstub: add a root memreserve config table (bsc#1117158).
- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).
- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).
- efi/arm: Revert 'Defer persistent reservations until after paging_init()' (bsc#1117158).
- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).
- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).
- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).
- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).
- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).
- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).
- efi/x86/Add missing error handling to old_memmap 1:1 mapping code (CVE-2019-12380,bsc#1136598).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).
- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).
- Fix kABI breakage by mwifiex security fix (CVE-2019-3846,bsc#1136424).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- floppy: fix div-by-zero in setup_format_params (CVE-2019-14283,bsc#1143191).
- floppy: fix out-of-bounds read in copy_buffer (CVE-2019-14283,bsc#1143191).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).
- fuse: fallocate: fix return with locked inode (bsc#1051510).
- fuse: fix writepages on 32bit (bsc#1051510).
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- git_sort: add crypto maintainer tree.
- gpio: fix gpio-adp5588 build errors (bsc#1051510).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).
- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).
- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).
- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- - HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- HID: wacom: Add support for Pro Pen slim (bsc#1051510).
- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- HID: wacom: correct touch resolution x/y typo (bsc#1051510).
- HID: wacom: Don't report anything prior to the tool entering range (bsc#1051510).
- HID: wacom: Don't set tool type until we're in range (bsc#1051510).
- HID: wacom: fix mistake in printk (bsc#1051510).
- HID: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- HID: wacom: generic: Correct pad syncing (bsc#1051510).
- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).
- HID: wacom: generic: Report AES battery information (bsc#1051510).
- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- HID: wacom: generic: Support multiple tools per report (bsc#1051510).
- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- HID: wacom: Mark expected switch fall-through (bsc#1051510).
- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- HID: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).
- hwmon: (core) add thermal sensors only if dev->of_node is present (bsc#1051510).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).
- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).
- hwmon: (k10temp) Add support for family 17h (FATE#327735).
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).
- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).
- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).
- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).
- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).
- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).
- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).
- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).
- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).
- hwrng: omap - Set default quality (bsc#1051510).
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).
- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).
- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).
- IB/mlx5: Fix leaking stack memory to userspace (bsc#1143045 CVE-2018-20855).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).
- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).
- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).
- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).
- inet: switch IP ID generator to siphash (CVE-2019-10638 bsc#1140575).
- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- Input: gtco - bounds check collection indent level (CVE-2019-13631,bsc#1142023).
- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- Input: psmouse - fix build error of multiple definition (bsc#1051510).
- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- Install extra rpm scripts for kernel subpackaging (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).
- iommu/arm-smmu-v3: Don't disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Don't clear eventid when freeing an MSI (bsc#1051510).
- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).
- iwlwifi: pcie: don't crash on invalid RX interrupt (bsc#1051510).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- Kabi fixup blk_mq_register_dev() (bsc#1140637).
- kabi: handle addition of net::hash_mix (CVE-2019-10639 bsc#1140577).
- kabi: handle addition of netns_ipv4::ip_id_key (CVE-2019-10638 bsc#1140575).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).
- kernel-binary: fix missing \
- kernel-binary: rpm does not support multiline condition
- kernel-binary: Use -c grep option in klp project detection.
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).
- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751).
- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- KMPs: provide and conflict a kernel version specific KMP name (bsc#1127155, bsc#1109137).
- KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- KVM: polling: add architecture backend to disable polling (bsc#1119222).
- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).
- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).
- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).
- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).
- KVM: PPC: Validate all tces before updating tables (bsc#1061840).
- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).
- KVM: s390: change default halt poll time to 50us (bsc#1119222).
- KVM: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222)
- KVM: s390: fix typo in parameter description (bsc#1119222).
- KVM: s390: kABI Workaround for 'kvm_vcpu_stat'
- KVM: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- KVM: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- KVM: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- KVM: x86: fix return value for reserved EFER (bsc#1140992).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- leds: avoid flush_work in atomic context (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).
- media: au0828: stop video streaming only when last user stops (bsc#1051510).
- media: coda: clear error return value before picture run (bsc#1051510).
- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).
- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: ov2659: make S_FMT succeed even if requested format doesn't match (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: saa7146: avoid high stack usage with clang (bsc#1051510).
- media: smsusb: better handle optional alignment (bsc#1051510).
- media: usb: siano: Fix false-positive 'uninitialized variable' warning (bsc#1051510).
- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- Merge branch 'origin/users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'packaging' into SLE15
- Merge branch 'scripts' into SLE15
- Merge branch 'scripts' into SLE15
- Merge branch 'SLE15_EMBARGO' into SLE12-SP4_EMBARGO
- Merge branch 'SLE15_EMBARGO' into SLE12-SP4_EMBARGO
- Merge branch 'SLE15_EMBARGO' into SLE15
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE15_EMBARGO
- Merge branch 'SLE15' into users/tiwai/SLE15/bsc1139358
- Merge branch 'SLE15' into users/tiwai/SLE15/bsc1139358
- Merge branch 'SLE15' into users/tiwai/SLE15/bsc1139358
- Merge branch 'users/bpetkov/SLE15/for-next' into SLE15
- Merge branch 'users/bpetkov/SLE15/for-next' into SLE15
- Merge branch 'users/dkirjanov/SLE15/for-next' into SLE15
- Merge branch 'users/fbaumanis/SLE15/for-next' into SLE15
- Merge branch 'users/fdmanana/SLE15/for-next' into SLE15
- Merge branch 'users/fdmanana/SLE15/for-next' into SLE15
- Merge branch 'users/fyang/SLE15/for-next' into SLE15
- Merge branch 'users/ggherdovich/SLE15/for-next' into SLE15
- Merge branch 'users/glin/SLE15/for-next' into SLE15
- Merge branch 'users/hare/SLE15/for-next' into SLE15
- Merge branch 'users/hare/SLE15/for-next' into SLE15
- Merge branch 'users/hare/SLE15/for-next' into SLE15
- Merge branch 'users/hare/SLE15/for-next' into SLE15
- Merge branch 'users/jack/SLE15/for-next' into SLE15
- Merge branch 'users/jack/SLE15/for-next' into SLE15
- Merge branch 'users/jack/SLE15/for-next' into SLE15
- Merge branch 'users/jack/SLE15/for-next' into SLE15
- Merge branch 'users/jdelvare/SLE15/for-next' into SLE15
- Merge branch 'users/jgross/SLE15/for-next' into SLE15
- Merge branch 'users/jroedel/SLE15/for-next' into SLE15
- Merge branch 'users/jroedel/SLE15/for-next' into SLE15
- Merge branch 'users/jslaby/SLE15/for-next' into SLE15
- Merge branch 'users/jslaby/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/lduncan/SLE15/for-next' into SLE15
- Merge branch 'users/lduncan/SLE15/for-next' into SLE15
- Merge branch 'users/lduncan/SLE15/for-next' into SLE15
- Merge branch 'users/lduncan/SLE15/for-next' into SLE15
- Merge branch 'users/lhenriques/SLE15/for-next' into SLE15
- Merge branch 'users/lyan/SLE15/for-next' into SLE15
- Merge branch 'users/lyan/SLE15/for-next' into SLE15
- Merge branch 'users/mbenes/SLE15/for-next' into SLE15
- Merge branch 'users/mbenes/SLE15/for-next' into SLE15
- Merge branch 'users/mbrugger/SLE15/for-next' into SLE15
- Merge branch 'users/mgorman/SLE15/for-next' into SLE15
- Merge branch 'users/mgorman/SLE15/for-next' into SLE15
- Merge branch 'users/mhocko/SLE12-SP4/bnc1136896' into users/mhocko/SLE12-SP4/for-next
- Merge branch 'users/mhocko/SLE15/bnc1139358' into SLE15
- Merge branch 'users/mhocko/SLE15/bnc1139358' into users/mhocko/SLE12-SP4/bnc1139358
- Merge branch 'users/mhocko/SLE15/for-next' into SLE15
- Merge branch 'users/mkoutny/SLE15/for-next' into SLE15
- Merge branch 'users/mkubecek/SLE15/1137586' into SLE15_EMBARGO
- Merge branch 'users/mkubecek/SLE15/1137586' into SLE15_EMBARGO
- Merge branch 'users/mkubecek/SLE15/for-next' into SLE15
- Merge branch 'users/mkubecek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/bsc1137534-s390-jumplabel-perf' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/nfbrown/SLE15/for-next' into SLE15
- Merge branch 'users/nfbrown/SLE15/for-next' into SLE15
- Merge branch 'users/ohering/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/osalvador/SLE15/for-next' into SLE15
- Merge branch 'users/ptesarik/SLE15/for-next' into SLE15
- Merge branch 'users/pvorel/SLE15/for-next' into SLE15
- Merge branch 'users/tbogendoerfer/SLE15/for-next' into SLE15
- Merge branch 'users/tzimmermann/SLE15/for-next' into SLE15
- Merge branch 'users/vbabka/SLE15/for-next' into SLE15
- Merge branch 'users/vbabka/SLE15/for-next' into SLE15
- Merge branch 'users/vbabka/SLE15/for-next' into SLE15
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4_EMBARGO
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4_EMBARGO
- Merge remote-tracking branch 'origin/users/fyang/SLE12-SP4/for-next' into SLE12-SP4
- Merge remote-tracking branch 'origin/users/ghe/SLE12-SP4/for-next' into SLE12-SP4
- Merge remote-tracking branch 'origin/users/mfleming/SLE12-SP4/for-next' into SLE12-SP4
- Merge remote-tracking branch 'origin/users/mhocko/SLE12-SP4/for-next' into SLE12-SP4
- Merge remote-tracking branch 'origin/users/msuchanek/SLE12-SP4/for-next' into SLE12-SP4
- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: Verify SD bus width (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: pagechage-limit: Calculate pagecache-limit based on node state (bsc#1136811)
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).
- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).
- Move patch to correct directory.
- Move stuff git_sort chokes on, out of the way
- Move upstreamed ASoC patches into sorted section
- mwifiex: Abort at too short BSS descriptor element (bsc#1136424 CVE-2019-3846).
- mwifiex: Don't abort on small, spec-compliant vendor IEs (CVE-2019-3846,bsc#1136424).
- mwifiex: fix 802.11n/WPA detection (CVE-2019-3846,bsc#1136424).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- mwifiex: Fix possible buffer overflows at parsing bss descriptor
- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- netns: get more entropy from net_hash_mix() (CVE-2019-10638 bsc#1140575).
- netns: provide pure entropy for net_hash_mix() (CVE-2019-10639 bsc#1140577).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- net: use indirect call wrappers at GRO network layer (bsc#1124503).
- net: use indirect call wrappers at GRO transport layer (bsc#1124503).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- NFS add module option to limit NFSv4 minor version (jsc#PM-231).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: Don't let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393)
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).
- patches.fixes/mm-Fix-modifying-of-page-protection-by-insert_pfn.patch: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)
- patches.fixes/scsi-vmw_pscsi-Fix-use-after-free-in-pvscsi_queue_lc.patch: Update patch metadata
- patches.suse/Btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).
- PCI: Always allow probing with driver_override (bsc#1051510).
- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).
- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).
- PCI: hv: support reporting serial number as slot information (bsc#1142701).
- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- PCI: Return error if cannot probe VF (bsc#1051510).
- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf tools: Add Hygon Dhyana support (fate#327735).
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- PM / core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).
- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test (FATE#327696).
- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).
- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).
- powerpc/process: Fix sparse address space warnings (bsc#1065729).
- powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property() (bsc#1137194, CVE-2019-12614).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- powerpc/tm: Fix oops on sigreturn on systems without TM (bsc#1142265 CVE-2019-13648).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (git-fixes).
- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).
- pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- ras/CEC: Convert the timer callback to a workqueue (bsc#1114279).
- ras/CEC: Fix binary search function (bsc#1114279).
- rds: IB: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- Replace the bluetooth fix with the upstream commit (bsc#1135556)
- Revert 'alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops' (bsc#1051510).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)' (bsc#1109137).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range' (bsc#1051510).
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).'
- Revert 'KMPs: provide and conflict a kernel version specific KMP name'
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995 fate#323487).
- Revert 'Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)''
- Revert 'Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).''
- Revert 'Revert 'KMPs: provide and conflict a kernel version specific KMP name''
- Revert 'Revert 'Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)'''
- Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).'
- Revert 'serial: 8250: Don't service RX FIFO if interrupts are disabled' (bsc#1051510).
- Revert 'Sign non-x86 kernels when possible (boo#1134303)'
- Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).
- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).
- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).
- rpm/kernel-binary.spec.in: Update drm-kmp obsolete for SLE12-SP3/Leap-42.3
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).
- rtc: don't reference bogus function pointer in kdoc (bsc#1051510).
- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts/tar-up.sh: do not make assumptions about the remote name (bsc#1141488)
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836 bsc#1134395).
- scsi: megaraid_sas: return error when create DMA pool failed (CVE-2019-11810 bsc#1134399).
- scsi: mpt3sas_ctl: fix double-fetch bug in _ctl_ioctl_main() (bsc#1136922 CVE-2019-12456).
- scsi: qla2xxx: Declare local functions 'static' (bsc#1137444).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: fix error message on <qla2400 (bsc#1118139).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: fix spelling mistake: 'existant' -> 'existent' (bsc#1118139).
- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).
- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).
- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).
- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).
- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes 'res' (bsc#1137444).
- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).
- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).
- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).
- scsi: qla2xxx: Remove unused symbols (bsc#1118139).
- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).
- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).
- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).
- Sign non-x86 kernels when possible (boo#1134303)
- SMB3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- Staging: vc04_services: Fix a couple error codes (bsc#1051510).
- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).
- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: be more careful in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- tcp: refine memory limit test in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- team: Always enable vlan tx offload (bsc#1051510).
- test_firmware: Use correct snprintf() limit (bsc#1135642).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).
- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support (fate#327735).
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- Trim build dependencies of sample subpackage spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).
- Update config files for NFSv4.2
- Update patches.fixes/0001-mwifiex-Fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch (bsc#1136935 CVE-2019-10126). Added CVE number
- Update patches.fixes/nfsd-COPY-and-CLONE-operations-require-the-saved-fil.patch (git-fixes, bsc#1137103, CVE-2018-16871).
- Update patches.suse/do-not-default-to-ibrs-on-skl.patch (bsc#1068032 CVE-2017-5753 bsc#1112824 jsc#SLE-7074).
- Update patch referecens for two sercurity fixes (CVE-2019-12819, bsc#1138291, CVE-2019-12818, bsc#1138293).
- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).
- Update 'SACK Panic' patches to reflect upstream state.
- Update upstream patch tags
- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).
- USB: core: Don't unbind interfaces following device reset failure (bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).
- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).
- usbnet: fix kernel crash after disconnect (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).
- USB: rio500: refuse more than one device at a time (bsc#1051510).
- USB: serial: fix initial-termios handling (bsc#1135642).
- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- USB: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).
- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- vxlan: trivial indenting fix (bsc#1051510).
- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).
- w1: fix the resume command API (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- x86/alternative: Init ideal_nops for Hygon Dhyana (fate#327735).
- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).
- x86/amd_nb: Check vendor in AMD-only functions (fate#327735).
- x86/apic: Add Hygon Dhyana support (fate#327735).
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery (fate#327735).
- x86/CPU/AMD: Don't force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/cpu: Create Hygon Dhyana architecture support file (fate#327735).
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana (fate#327735).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number (fate#327735).
- x86/events: Add Hygon Dhyana support to PMU infrastructure (fate#327735).
- x86/kvm: Add Hygon Dhyana support to KVM (fate#327735).
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure (fate#327735).
- x86/mce: Don't disable MCA banks when offlining a CPU on AMD (fate#327735).
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge (fate#327735).
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana (fate#327735).
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358, CVE-2019-1125).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/xen: Add Hygon Dhyana support to Xen (fate#327735).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xen/pciback: Don't disable PCI_COMMAND on PCI device reset (bsc#1065600).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: don't clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: don't look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: don't overflow xattr listent buffer (bsc#1143105).
- xfs: don't use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: don't use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).
- xhci: update bounce buffer with correct sg num (bsc#1051510).
- xhci: Use %zu for printing size_t type (bsc#1051510).
Patchnames
SUSE-2019-2450,SUSE-SLE-RT-12-SP4-2019-2450
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise Server 12 SP4 Realtime Kernel was updated to fix bugs and security issues.\n\nSecurity issues fixed:\n\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).\n- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).\n- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).\n- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).\n- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).\n- CVE-2019-1125: Enable Spectre v1 mitigations for SWAPGS (bsc#1139358).\n- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)\n- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker\u0027s web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#1140577)\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586)\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)\n- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#1136598)\n- CVE-2019-12456: a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)\n- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)\n\nOther issues fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- acpi: Add Hygon Dhyana support (fate#327735).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- added De0-Nanos-SoC board support (and others based on Altera SOC).\n- Add kernel-subpackage-build.spec (FATE#326579).\n- Add sample kernel-default-base spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- Add support for crct10dif-vpmsum (FATE#327696).\n- Add version information to KLP_SYMBOLS file\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Don\u0027t allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: fix acpi dependencies (bsc#1117158).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64/x86: Update config files.\n- ASoC : cs4265 : readable register too low (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: don\u0027t set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- Bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- Build klp-symbols in kernel devel projects.\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Don\u0027t yell about bad mmc phases when getting (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coredump: fix race condition between collapse_huge_page() and core dumping (bnc#1133738, CVE-2019-11599).\n- coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (bsc#1133738, CVE-2019-11599).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189)\n- Correct the patch reference tag for scsi fix (bsc#1136922 CVE-2019-12456)\n- cpufreq: acpi-cpufreq: Report if CPU doesn\u0027t support boost technologies (bsc#1051510).\n- cpufreq: Add Hygon Dhyana support (fate#327735).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ (fate#327735).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - fix the SEV probe in kexec boot path (bsc#1136896).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#11123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dm, dax: Fix detection of DAX support (bsc#1139782).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n- Documentation: Add MDS vulnerability documentation (bsc#1135642).\n- Documentation: Correct the possible MDS sysfs values (bsc#1135642).\n- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not provide kernel-default-srchash from kernel-default-base.\n- Don\u0027t restrict NFSv4.2 on openSUSE (bsc#1138719).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: thermal: tsens: Don\u0027t print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- edac, amd64: Add Hygon Dhyana support (fate#327735).\n- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Don\u0027t mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158). \n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi/x86/Add missing error handling to old_memmap 1:1 mapping code (CVE-2019-12380,bsc#1136598).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- Fix kABI breakage by mwifiex security fix (CVE-2019-3846,bsc#1136424).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- floppy: fix div-by-zero in setup_format_params (CVE-2019-14283,bsc#1143191).\n- floppy: fix out-of-bounds read in copy_buffer (CVE-2019-14283,bsc#1143191).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- git_sort: add crypto maintainer tree.\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- - HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: correct touch resolution x/y typo (bsc#1051510).\n- HID: wacom: Don\u0027t report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Don\u0027t set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: Correct pad syncing (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n- hwmon: (core) add thermal sensors only if dev-\u003eof_node is present (bsc#1051510).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).\n- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).\n- hwmon: (k10temp) Add support for family 17h (FATE#327735).\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).\n- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).\n- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).\n- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).\n- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).\n- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).\n- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).\n- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).\n- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n- IB/mlx5: Fix leaking stack memory to userspace (bsc#1143045 CVE-2018-20855).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inet: switch IP ID generator to siphash (CVE-2019-10638 bsc#1140575).\n- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- Input: gtco - bounds check collection indent level (CVE-2019-13631,bsc#1142023).\n- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- Input: psmouse - fix build error of multiple definition (bsc#1051510).\n- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- Install extra rpm scripts for kernel subpackaging (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Don\u0027t disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Don\u0027t clear eventid when freeing an MSI (bsc#1051510).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: don\u0027t crash on invalid RX interrupt (bsc#1051510).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- Kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi: handle addition of net::hash_mix (CVE-2019-10639 bsc#1140577).\n- kabi: handle addition of netns_ipv4::ip_id_key (CVE-2019-10638 bsc#1140575).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).\n- kernel-binary: fix missing \\\n- kernel-binary: rpm does not support multiline condition\n- kernel-binary: Use -c grep option in klp project detection.\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751).\n- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- KMPs: provide and conflict a kernel version specific KMP name (bsc#1127155, bsc#1109137).\n- KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- KVM: polling: add architecture backend to disable polling (bsc#1119222).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: s390: change default halt poll time to 50us (bsc#1119222).\n- KVM: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222)\n- KVM: s390: fix typo in parameter description (bsc#1119222).\n- KVM: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027\n- KVM: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- KVM: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- KVM: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- KVM: x86: fix return value for reserved EFER (bsc#1140992).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format doesn\u0027t match (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- Merge branch \u0027origin/users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027packaging\u0027 into SLE15\n- Merge branch \u0027scripts\u0027 into SLE15\n- Merge branch \u0027scripts\u0027 into SLE15\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE12-SP4_EMBARGO\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE12-SP4_EMBARGO\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE15\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE15_EMBARGO\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027users/bpetkov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/bpetkov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/dkirjanov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fbaumanis/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fdmanana/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fdmanana/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fyang/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ggherdovich/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/glin/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jdelvare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jgross/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jroedel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jroedel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jslaby/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jslaby/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lhenriques/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lyan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lyan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbenes/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbenes/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbrugger/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mgorman/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mgorman/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mhocko/SLE12-SP4/bnc1136896\u0027 into users/mhocko/SLE12-SP4/for-next\n- Merge branch \u0027users/mhocko/SLE15/bnc1139358\u0027 into SLE15\n- Merge branch \u0027users/mhocko/SLE15/bnc1139358\u0027 into users/mhocko/SLE12-SP4/bnc1139358\n- Merge branch \u0027users/mhocko/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkoutny/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkubecek/SLE15/1137586\u0027 into SLE15_EMBARGO\n- Merge branch \u0027users/mkubecek/SLE15/1137586\u0027 into SLE15_EMBARGO\n- Merge branch \u0027users/mkubecek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkubecek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/bsc1137534-s390-jumplabel-perf\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/nfbrown/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/nfbrown/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ohering/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/osalvador/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ptesarik/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/pvorel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/tbogendoerfer/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/tzimmermann/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4_EMBARGO\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4_EMBARGO\n- Merge remote-tracking branch \u0027origin/users/fyang/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/ghe/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/mfleming/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/mhocko/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/msuchanek/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: pagechage-limit: Calculate pagecache-limit based on node state (bsc#1136811)\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- Move patch to correct directory.\n- Move stuff git_sort chokes on, out of the way\n- Move upstreamed ASoC patches into sorted section\n- mwifiex: Abort at too short BSS descriptor element (bsc#1136424 CVE-2019-3846).\n- mwifiex: Don\u0027t abort on small, spec-compliant vendor IEs (CVE-2019-3846,bsc#1136424).\n- mwifiex: fix 802.11n/WPA detection (CVE-2019-3846,bsc#1136424).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- netns: get more entropy from net_hash_mix() (CVE-2019-10638 bsc#1140575).\n- netns: provide pure entropy for net_hash_mix() (CVE-2019-10639 bsc#1140577).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- NFS add module option to limit NFSv4 minor version (jsc#PM-231).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: Don\u0027t let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393)\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- patches.fixes/mm-Fix-modifying-of-page-protection-by-insert_pfn.patch: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- patches.fixes/scsi-vmw_pscsi-Fix-use-after-free-in-pvscsi_queue_lc.patch: Update patch metadata\n- patches.suse/Btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).\n- PCI: Always allow probing with driver_override (bsc#1051510).\n- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).\n- PCI: hv: support reporting serial number as slot information (bsc#1142701).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- PCI: Return error if cannot probe VF (bsc#1051510).\n- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf tools: Add Hygon Dhyana support (fate#327735).\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- PM / core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test (FATE#327696).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property() (bsc#1137194, CVE-2019-12614).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- powerpc/tm: Fix oops on sigreturn on systems without TM (bsc#1142265 CVE-2019-13648).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME (git-fixes).\n- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n- pwm: stm32: Use 3 cells -\u003eof_xlate() (bsc#1111666).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- ras/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- ras/CEC: Fix binary search function (bsc#1114279).\n- rds: IB: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- Replace the bluetooth fix with the upstream commit (bsc#1135556)\n- Revert \u0027alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027 (bsc#1109137).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range\u0027 (bsc#1051510).\n- Revert \u0027KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\u0027\n- Revert \u0027KMPs: provide and conflict a kernel version specific KMP name\u0027\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995 fate#323487).\n- Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027\u0027\n- Revert \u0027Revert \u0027KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\u0027\u0027\n- Revert \u0027Revert \u0027KMPs: provide and conflict a kernel version specific KMP name\u0027\u0027\n- Revert \u0027Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027\u0027\u0027\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027\n- Revert \u0027serial: 8250: Don\u0027t service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- Revert \u0027Sign non-x86 kernels when possible (boo#1134303)\u0027\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).\n- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).\n- rpm/kernel-binary.spec.in: Update drm-kmp obsolete for SLE12-SP3/Leap-42.3\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: don\u0027t reference bogus function pointer in kdoc (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts/tar-up.sh: do not make assumptions about the remote name (bsc#1141488)\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836 bsc#1134395).\n- scsi: megaraid_sas: return error when create DMA pool failed (CVE-2019-11810 bsc#1134399).\n- scsi: mpt3sas_ctl: fix double-fetch bug in _ctl_ioctl_main() (bsc#1136922 CVE-2019-12456).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: fix error message on \u0026lt;qla2400 (bsc#1118139).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- signal/ptrace: Don\u0027t leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n- Sign non-x86 kernels when possible (boo#1134303)\n- SMB3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- Staging: vc04_services: Fix a couple error codes (bsc#1051510).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: be more careful in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- tcp: refine memory limit test in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- team: Always enable vlan tx offload (bsc#1051510).\n- test_firmware: Use correct snprintf() limit (bsc#1135642).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support (fate#327735).\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- Trim build dependencies of sample subpackage spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- Update config files for NFSv4.2\n- Update patches.fixes/0001-mwifiex-Fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch (bsc#1136935 CVE-2019-10126). Added CVE number\n- Update patches.fixes/nfsd-COPY-and-CLONE-operations-require-the-saved-fil.patch (git-fixes, bsc#1137103, CVE-2018-16871).\n- Update patches.suse/do-not-default-to-ibrs-on-skl.patch (bsc#1068032 CVE-2017-5753 bsc#1112824 jsc#SLE-7074).\n- Update patch referecens for two sercurity fixes (CVE-2019-12819, bsc#1138291, CVE-2019-12818, bsc#1138293).\n- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).\n- Update \u0027SACK Panic\u0027 patches to reflect upstream state.\n- Update upstream patch tags\n- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- USB: core: Don\u0027t unbind interfaces following device reset failure (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- USB: rio500: refuse more than one device at a time (bsc#1051510).\n- USB: serial: fix initial-termios handling (bsc#1135642).\n- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- USB: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86/alternative: Init ideal_nops for Hygon Dhyana (fate#327735).\n- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).\n- x86/amd_nb: Check vendor in AMD-only functions (fate#327735).\n- x86/apic: Add Hygon Dhyana support (fate#327735).\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery (fate#327735).\n- x86/CPU/AMD: Don\u0027t force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/cpu: Create Hygon Dhyana architecture support file (fate#327735).\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana (fate#327735).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number (fate#327735).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure (fate#327735).\n- x86/kvm: Add Hygon Dhyana support to KVM (fate#327735).\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure (fate#327735).\n- x86/mce: Don\u0027t disable MCA banks when offlining a CPU on AMD (fate#327735).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge (fate#327735).\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana (fate#327735).\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358, CVE-2019-1125).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/xen: Add Hygon Dhyana support to Xen (fate#327735).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xen/pciback: Don\u0027t disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: don\u0027t clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: don\u0027t look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: don\u0027t overflow xattr listent buffer (bsc#1143105).\n- xfs: don\u0027t use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: don\u0027t use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2450,SUSE-SLE-RT-12-SP4-2019-2450", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2450-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2450-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2450-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1053043", "url": "https://bugzilla.suse.com/1053043" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1106751", "url": "https://bugzilla.suse.com/1106751" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 11123080", "url": "https://bugzilla.suse.com/11123080" }, { "category": "self", "summary": "SUSE Bug 1112824", "url": "https://bugzilla.suse.com/1112824" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1115688", "url": "https://bugzilla.suse.com/1115688" }, { "category": "self", "summary": "SUSE Bug 1117158", "url": "https://bugzilla.suse.com/1117158" }, { "category": "self", "summary": "SUSE Bug 1118139", "url": "https://bugzilla.suse.com/1118139" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1120566", "url": "https://bugzilla.suse.com/1120566" }, { "category": "self", "summary": "SUSE Bug 1124167", "url": "https://bugzilla.suse.com/1124167" }, { "category": "self", "summary": "SUSE Bug 1124503", "url": "https://bugzilla.suse.com/1124503" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1128910", "url": "https://bugzilla.suse.com/1128910" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1132154", "url": "https://bugzilla.suse.com/1132154" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134393", "url": "https://bugzilla.suse.com/1134393" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1134671", "url": "https://bugzilla.suse.com/1134671" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135661", "url": "https://bugzilla.suse.com/1135661" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136424", "url": "https://bugzilla.suse.com/1136424" }, { "category": "self", "summary": "SUSE Bug 1136598", "url": "https://bugzilla.suse.com/1136598" }, { "category": "self", "summary": "SUSE Bug 1136811", "url": "https://bugzilla.suse.com/1136811" }, { "category": "self", "summary": "SUSE Bug 1136896", "url": "https://bugzilla.suse.com/1136896" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1136935", "url": "https://bugzilla.suse.com/1136935" }, { "category": "self", "summary": "SUSE Bug 1136990", "url": "https://bugzilla.suse.com/1136990" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137162", "url": "https://bugzilla.suse.com/1137162" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137372", "url": "https://bugzilla.suse.com/1137372" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137444", "url": "https://bugzilla.suse.com/1137444" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137586", "url": "https://bugzilla.suse.com/1137586" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137739", "url": "https://bugzilla.suse.com/1137739" }, { "category": "self", "summary": "SUSE Bug 1137752", "url": "https://bugzilla.suse.com/1137752" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137995", "url": "https://bugzilla.suse.com/1137995" }, { "category": "self", "summary": "SUSE Bug 1137996", "url": "https://bugzilla.suse.com/1137996" }, { "category": "self", "summary": "SUSE Bug 1137998", "url": "https://bugzilla.suse.com/1137998" }, { "category": "self", "summary": "SUSE Bug 1137999", "url": "https://bugzilla.suse.com/1137999" }, { "category": "self", "summary": "SUSE Bug 1138000", "url": "https://bugzilla.suse.com/1138000" }, { "category": "self", "summary": "SUSE Bug 1138002", "url": "https://bugzilla.suse.com/1138002" }, { "category": "self", "summary": "SUSE Bug 1138003", "url": "https://bugzilla.suse.com/1138003" }, { "category": "self", "summary": "SUSE Bug 1138005", "url": "https://bugzilla.suse.com/1138005" }, { "category": "self", "summary": "SUSE Bug 1138006", "url": "https://bugzilla.suse.com/1138006" }, { "category": "self", "summary": "SUSE Bug 1138007", "url": "https://bugzilla.suse.com/1138007" }, { "category": "self", "summary": "SUSE Bug 1138008", "url": "https://bugzilla.suse.com/1138008" }, { "category": "self", "summary": "SUSE Bug 1138009", "url": "https://bugzilla.suse.com/1138009" }, { "category": "self", "summary": "SUSE Bug 1138010", "url": "https://bugzilla.suse.com/1138010" }, { "category": "self", "summary": "SUSE Bug 1138011", "url": "https://bugzilla.suse.com/1138011" }, { "category": "self", "summary": "SUSE Bug 1138012", "url": "https://bugzilla.suse.com/1138012" }, { "category": "self", "summary": "SUSE Bug 1138013", "url": "https://bugzilla.suse.com/1138013" }, { "category": "self", "summary": "SUSE Bug 1138014", "url": "https://bugzilla.suse.com/1138014" }, { "category": "self", "summary": "SUSE Bug 1138015", "url": "https://bugzilla.suse.com/1138015" }, { "category": "self", "summary": "SUSE Bug 1138016", "url": "https://bugzilla.suse.com/1138016" }, { "category": "self", "summary": "SUSE Bug 1138017", "url": "https://bugzilla.suse.com/1138017" }, { "category": "self", "summary": "SUSE Bug 1138018", "url": "https://bugzilla.suse.com/1138018" }, { "category": "self", "summary": "SUSE Bug 1138019", "url": "https://bugzilla.suse.com/1138019" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139782", "url": "https://bugzilla.suse.com/1139782" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1141488", "url": "https://bugzilla.suse.com/1141488" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142265", "url": "https://bugzilla.suse.com/1142265" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10126 page", "url": "https://www.suse.com/security/cve/CVE-2019-10126/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12380 page", "url": "https://www.suse.com/security/cve/CVE-2019-12380/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-09-24T11:56:26Z", "generator": { "date": "2019-09-24T11:56:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2450-1", "initial_release_date": "2019-09-24T11:56:26Z", "revision_history": [ { "date": "2019-09-24T11:56:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-8.3.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-8.3.1.noarch", "product_id": "kernel-devel-rt-4.12.14-8.3.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-8.3.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-8.3.1.noarch", "product_id": "kernel-source-rt-4.12.14-8.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-rt-4.12.14-8.3.1.x86_64", "product_id": "kernel-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-8.3.1.x86_64", "product_id": "kernel-rt-base-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-8.3.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-8.3.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-8.3.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-8.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-8.3.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-8.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-10126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10126" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10126", "url": "https://www.suse.com/security/cve/CVE-2019-10126" }, { "category": "external", "summary": "SUSE Bug 1136935 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1136935" }, { "category": "external", "summary": "SUSE Bug 1137944 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1137944" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "important" } ], "title": "CVE-2019-10126" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-12380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12380" } ], "notes": [ { "category": "general", "text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12380", "url": "https://www.suse.com/security/cve/CVE-2019-12380" }, { "category": "external", "summary": "SUSE Bug 1136598 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1136598" }, { "category": "external", "summary": "SUSE Bug 1155298 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1155298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-12380" }, { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-12819" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-14284" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-3846" } ] }
suse-su-2019:3223-1
Vulnerability from csaf_suse
Published
2019-12-10 09:12
Modified
2019-12-10 09:12
Summary
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_6 fixes several issues.
The following security issues were fixed:
- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a
null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server
(bsc#1156320).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
Patchnames
SUSE-2019-3223,SUSE-SLE-Live-Patching-12-SP4-2019-3223
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a \n null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server\n (bsc#1156320). \n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-3223,SUSE-SLE-Live-Patching-12-SP4-2019-3223", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3223-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:3223-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193223-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:3223-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" }, { "category": "self", "summary": "SUSE Bug 1153108", "url": "https://bugzilla.suse.com/1153108" }, { "category": "self", "summary": "SUSE Bug 1156320", "url": "https://bugzilla.suse.com/1156320" }, { "category": "self", "summary": "SUSE Bug 1156321", "url": "https://bugzilla.suse.com/1156321" }, { "category": "self", "summary": "SUSE Bug 1156334", "url": "https://bugzilla.suse.com/1156334" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13272 page", "url": "https://www.suse.com/security/cve/CVE-2019-13272/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15917 page", "url": "https://www.suse.com/security/cve/CVE-2019-15917/" } ], "title": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)", "tracking": { "current_release_date": "2019-12-10T09:12:02Z", "generator": { "date": "2019-12-10T09:12:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:3223-1", "initial_release_date": "2019-12-10T09:12:02Z", "revision_history": [ { "date": "2019-12-10T09:12:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "product_id": "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", "product_id": "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-10T09:12:02Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-10T09:12:02Z", "details": "moderate" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-13272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13272" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13272", "url": "https://www.suse.com/security/cve/CVE-2019-13272" }, { "category": "external", "summary": "SUSE Bug 1140671 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1140671" }, { "category": "external", "summary": "SUSE Bug 1156321 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1156321" }, { "category": "external", "summary": "SUSE Bug 1198122 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1198122" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-10T09:12:02Z", "details": "moderate" } ], "title": "CVE-2019-13272" }, { "cve": "CVE-2019-15917", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15917" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15917", "url": "https://www.suse.com/security/cve/CVE-2019-15917" }, { "category": "external", "summary": "SUSE Bug 1149539 for CVE-2019-15917", "url": "https://bugzilla.suse.com/1149539" }, { "category": "external", "summary": "SUSE Bug 1156334 for CVE-2019-15917", "url": "https://bugzilla.suse.com/1156334" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-12-10T09:12:02Z", "details": "important" } ], "title": "CVE-2019-15917" } ] }
suse-su-2019:2069-1
Vulnerability from csaf_suse
Published
2019-08-06 22:50
Modified
2019-08-06 22:50
Summary
Security update for the Linux Kernel for Azure
Notes
Title of the patch
Security update for the Linux Kernel for Azure
Description of the patch
The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in create_qp_common, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. (bnc#bsc#1103991)
- CVE-2019-1125: Fix Spectre V1 variant via swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. (bnc#bsc#1143189)
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. (bsc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. (bsc#1134399)
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)
- CVE-2019-13631: In parse_hid_report_descriptor, a malicious usb device could send an hid: report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. (bsc#1140577)
- CVE-2019-13233: In arch/x86/lib/insn-eval.c, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation. (bnc#1140454)
- CVE-2018-20836: In the Linux kernel there was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. (bnc#1134395)
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12817: Linux kernel for powerpc had a bug where unrelated processes could be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected. (bsc#1138263, bsc#1139619)
- CVE-2019-12614: In dlpar_parse_cc_property there was an unchecked kstrdup of prop->name, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1137194)
- CVE-2018-16871: An attacker, who was able to mount an exported NFS filesystem, was able to trigger a null pointer dereference by using an invalid NFS sequence. This could panic the machine and deny access to the NFS server. (bsc#1137103)
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() calls put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bsc#1138293)
The following non-security bugs were fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- acpi: Add Hygon Dhyana support ().
- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- acpica: Clear status of GPEs on first direct enable (bsc#1111666).
- af_key: unconditionally clone on broadcast (bsc#1051510).
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).
- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).
- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).
- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- asoc: : cs4265 : readable register too low (bsc#1051510).
- asoc:: cs42xx8: Add regcache mask dirty (bsc#1051510).
- asoc:: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- asoc:: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- asoc:: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc:: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath10k: Do not send probe response template for mesh (bsc#1111666).
- ath10k: Fix encoding for protected management frames (bsc#1111666).
- ath10k: add missing error handling (bsc#1111666).
- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).
- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).
- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).
- ath10k: fix pciE device wake up failed (bsc#1111666).
- ath6kl: add some bounds checking (bsc#1051510).
- ath9k: Check for errors when reading SREV register (bsc#1111666).
- ath9k: correctly handle short radar pulses (bsc#1111666).
- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bluetooth: Replace the bluetooth fix with the upstream commit (bsc#1135556)
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).
- bnxt_en: Add support for BCM957504 (bsc#1137224).
- bnxt_en: Cap the returned MSIX vectors to the rdma driver (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Disable bus master during pci shutdown and driver unload (bsc#1104745).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bnxt_en: Fix statistics context reservation logic for rdma driver (bsc#1104745).
- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).
- bpf, devmap: Add missing bulk queue free (bsc#1109837).
- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).
- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).
- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).
- bpf: fix callees pruning callers (bsc#1109837).
- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).
- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).
- bpf: sockmap fix msg->sg.size account on ingress skb (bsc#1109837).
- bpf: sockmap remove duplicate queue free (bsc#1109837).
- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).
- brcmfmac: fix NULL pointer derefence during usb disconnect (bsc#1111666).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- carl9170: fix misuse of device driver API (bsc#1111666).
- ceph: factor out ceph_lookup_inode() (bsc#1138681).
- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- ceph: quota: fix quota subdir mounts (bsc#1138681).
- ceph: remove duplicated filelock ref increase (bsc#1138681).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().
- cpufreq: Add Hygon Dhyana support ().
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).
- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).
- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dmaengine: Replace WARN_TAINT_ONCE() with pr_warn_once() (jsc#SLE-5442).
- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- dmaengine: ioat: constify pci_device_id (jsc#SLE-5442).
- dmaengine: ioat: do not use DMA_ERROR_CODE (jsc#SLE-5442).
- dmaengine: ioat: fix prototype of ioat_enumerate_channels (jsc#SLE-5442).
- dmaengine: ioatdma: Add Snow Ridge ioatdma device id (jsc#SLE-5442).
- dmaengine: ioatdma: Add intr_coalesce sysfs entry (jsc#SLE-5442).
- dmaengine: ioatdma: add descriptor pre-fetch support for v3.4 (jsc#SLE-5442).
- dmaengine: ioatdma: disable DCA enabling on IOATDMA v3.4 (jsc#SLE-5442).
- dmaengine: ioatdma: set the completion address register after channel reset (jsc#SLE-5442).
- dmaengine: ioatdma: support latency tolerance report (LTR) for v3.4 (jsc#SLE-5442).
- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).
- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).
- dmaengine: tegra210-adma: restore channel status (bsc#1111666).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- documentation/ABI: Document umwait control sysfs interfaces (jsc#SLE-5187).
- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base/devres: introduce devm_release_action() (bsc#1103992).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers/dma/ioat: Remove now-redundant smp_read_barrier_depends() (jsc#SLE-5442).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).
- drm/amd/display: Make some functions static (bsc#1111666).
- drm/amd/display: Set stream->mode_changed when connectors change (bsc#1111666).
- drm/amd/display: Use plane->color_space for dpp if specified (bsc#1111666).
- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).
- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).
- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).
- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).
- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).
- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).
- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).
- drm/fb-helper: generic: Do not take module ref for fbcon (bsc#1111666).
- drm/i915/aml: Add new Amber Lake pci ID (jsc#SLE-4986).
- drm/i915/cfl: Adding another pci Device ID (jsc#SLE-4986).
- drm/i915/cml: Add CML pci IDS (jsc#SLE-4986).
- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).
- drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/i915: Add new AML_ULX support list (jsc#SLE-4986).
- drm/i915: Add new ICL pci ID (jsc#SLE-4986).
- drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).
- drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).
- drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).
- drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).
- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).
- drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).
- drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).
- drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).
- drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).
- drm/i915: Split some pci ids into separate groups (jsc#SLE-4986).
- drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).
- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).
- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).
- drm/lease: Make sure implicit planes are leased (bsc#1111666).
- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).
- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).
- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).
- drm/mediatek: fix unbind functions (bsc#1111666).
- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).
- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).
- drm/msm: fix fb references in async update (bsc#1111666).
- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).
- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).
- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).
- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).
- drm/pl111: fix possible object reference leak (bsc#1111666).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).
- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).
- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).
- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).
- drm/udl: move to embedding drm device inside udl device (bsc#1111666).
- drm/v3d: Handle errors from IRQ setup (bsc#1111666).
- drm/vc4: fix fb references in async update (bsc#1141312).
- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).
- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).
- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).
- drm: Fix drm_release() and device unplug (bsc#1111666).
- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).
- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).
- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).
- drm: do not block fb changes for async plane updates (bsc#1111666).
- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).
- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- edac, amd64: Add Hygon Dhyana support ().
- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).
- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).
- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- fs: Abort file_remove_privs() for non-reg. files (bsc#1140888).
- fs: kill btrfs clear path blocking (bsc#1140139).
- fs: Btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).
- hid:: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- hid:: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- hid:: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- hid:: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- hid:: wacom: Add support for Pro Pen slim (bsc#1051510).
- hid:: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- hid:: wacom: Do not report anything prior to the tool entering range (bsc#1051510).
- hid:: wacom: Do not set tool type until we're in range (bsc#1051510).
- hid:: wacom: Mark expected switch fall-through (bsc#1051510).
- hid:: wacom: Move handling of hid: quirks into a dedicated function (bsc#1051510).
- hid:: wacom: Move hid: fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- hid:: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- hid:: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- hid:: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- hid:: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- hid:: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- hid:: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- hid:: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- hid:: wacom: Work around hid: descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- hid:: wacom: convert Wacom custom usages to standard hid: usages (bsc#1051510).
- hid:: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid:: wacom: fix mistake in printk (bsc#1051510).
- hid:: wacom: generic: Correct pad syncing (bsc#1051510).
- hid:: wacom: generic: Ignore hid:_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- hid:: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- hid:: wacom: generic: Refactor generic battery handling (bsc#1051510).
- hid:: wacom: generic: Report AES battery information (bsc#1051510).
- hid:: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- hid:: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- hid:: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- hid:: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- hid:: wacom: generic: Support multiple tools per report (bsc#1051510).
- hid:: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- hid:: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- hid:: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid:: wacom: generic: read hid:_DG_CONTACTMAX from any feature report (bsc#1051510).
- hid:: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).
- hv/netvsc: Set probe mode to sync (bsc#1142083).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().
- hwmon: (k10temp) Add Hygon Dhyana support ().
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().
- hwmon: (k10temp) Add support for family 17h ().
- hwmon: (k10temp) Add support for temperature offsets ().
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().
- hwmon: (k10temp) Correct model name for Ryzen 1600X ().
- hwmon: (k10temp) Display both Tctl and Tdie ().
- hwmon: (k10temp) Fix reading critical temperature register ().
- hwmon: (k10temp) Make function get_raw_temp static ().
- hwmon: (k10temp) Move chip specific code into probe function ().
- hwmon: (k10temp) Only apply temperature offset if result is positive ().
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().
- hwmon: (k10temp) Use API function to access System Management Network ().
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().
- i2c-piix4: Add Hygon Dhyana SMBus support ().
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).
- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).
- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).
- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).
- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).
- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).
- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).
- ib/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685).
- ib/hfi1: Create inline to get extended headers (bsc#1114685 ).
- ib/hfi1: Validate fault injection opcode user input (bsc#1114685 ).
- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).
- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).
- ib/mlx5: Verify DEVX general object type correctly (bsc#1103991 ).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle RMRR with pci bridge device scopes (bsc#1140961).
- iommu/vt-d: Handle pci bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).
- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).
- iwlwifi: Correct iwlwifi 22000 series ucode file name (bsc#1142673)
- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).
- iwlwifi: correct one of the pci struct names (bsc#1111666).
- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).
- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).
- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).
- iwlwifi: fix devices with pci Device ID 0x34F0 and 11ac RF modules (bsc#1111666).
- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).
- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).
- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).
- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).
- kABI workaround for asus-wmi changes (bsc#1051510).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kABI: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi fixup blk_mq_register_dev() (bsc#1140637).
- kabi/severities: Whitelist airq_iv_* (s390-specific)
- kabi/severities: Whitelist more s390x internal symbols
- kabi/severities: Whitelist s390 internal-only symbols
- kabi: Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 ).
- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).
- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel-binary: Use -c grep option in klp project detection.
- kernel-binary: fix missing \
- kernel-binary: rpm does not support multiline condition
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- kvm: x86: fix return value for reserved EFER (bsc#1140992).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).
- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).
- libceph: assign cookies in linger_submit() (bsc#1135897).
- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).
- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).
- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).
- libceph: introduce alloc_watch_request() (bsc#1135897).
- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).
- libceph: preallocate message data items (bsc#1135897).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).
- mac80211: do not start any work during reconfigure flow (bsc#1111666).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).
- mac80211: free peer keys before vif down in mesh (bsc#1111666).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- mac80211: mesh: fix RCU warning (bsc#1111666).
- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).
- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).
- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).
- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).
- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).
- mlxsw: pci: Reincrease pci reset timeout (bsc#1112374).
- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).
- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).
- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).
- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).
- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm/page_alloc.c: avoid potential NULL pointer dereference (git fixes (mm/pagealloc)).
- mm/page_alloc.c: fix never set ALLOC_NOFRAGMENT flag (git fixes (mm/pagealloc)).
- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: complete HS400 before checking status (bsc#1111666).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).
- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).
- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net/mlx5: Avoid reloading already removed devices (bsc#1103990 ).
- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990).
- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 ).
- net/mlx5: Set completion EQs as shared resources (bsc#1103991 ).
- net/mlx5: Update pci error handler entries and command translation (bsc#1103991).
- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990).
- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 ).
- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990).
- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 ).
- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).
- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).
- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 ).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).
- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).
- net/tls: avoid NULL pointer deref on nskb->sk in fallback (bsc#1109837).
- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).
- net/tls: do not copy negative amounts of data in reencrypt (bsc#1109837).
- net/tls: do not ignore netdev notifications if no TLS features (bsc#1109837).
- net/tls: do not leak IV and record seq when offload fails (bsc#1109837).
- net/tls: do not leak partially sent record in device mode (bsc#1109837).
- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).
- net/tls: fix copy to fragments in reencrypt (bsc#1109837).
- net/tls: fix page double free on TX cleanup (bsc#1109837).
- net/tls: fix refcount adjustment in fallback (bsc#1109837).
- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).
- net/tls: fix state removal with feature flags off (bsc#1109837).
- net/tls: fix the IV leaks (bsc#1109837).
- net/tls: make sure offload also gets the keys wiped (bsc#1109837).
- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).
- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).
- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).
- net: Fix missing meta data in skb with vlan packet (bsc#1109837).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: core: support XDP generic on stacked devices (bsc#1109837).
- net: do not clear sock->sk early to avoid trouble in strparser (bsc#1103990).
- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).
- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).
- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).
- net: ena: add good checksum counter (bsc#1138879).
- net: ena: add handling of llq max tx burst size (bsc#1138879).
- net: ena: add newline at the end of pr_err prints (bsc#1138879).
- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).
- net: ena: allow automatic fallback to polling mode (bsc#1138879).
- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).
- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).
- net: ena: enable negotiating larger Rx ring size (bsc#1138879).
- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).
- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).
- net: ena: fix incorrect test of supported hash function (bsc#1138879).
- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).
- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).
- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).
- net: ena: gcc 8: fix compilation warning (bsc#1138879).
- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).
- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).
- net: ena: optimise calculations for CQ doorbell (bsc#1138879).
- net: ena: remove inline keyword from functions in *.c (bsc#1138879).
- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).
- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).
- net: ena: use dev_info_once instead of static variable (bsc#1138879).
- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- net: hns3: Fix inconsistent indenting (bsc#1140676).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).
- net: hns: Fix loopback test failed at copper ports (bsc#1140676).
- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).
- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).
- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).
- net: hns: fix unsigned comparison to less than zero (bsc#1140676).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).
- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).
- nfs: Do not restrict NFSv4.2 on openSUSE (bsc#1138719).
- nl80211: fix station_info pertid memory leak (bsc#1051510).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for pcie ports (bsc#1142623).
- pci/AER: Use cached AER Capability offset (bsc#1142623).
- pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803).
- pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803).
- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).
- pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992).
- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).
- pci/portdrv: Consolidate comments (bsc#1142623).
- pci/portdrv: Disable port driver in compat mode (bsc#1142623).
- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).
- pci/portdrv: Support pcie services on subtractive decode bridges (bsc#1142623).
- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)
- pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).
- pci: Do not poll for PME if the device is in D3cold (bsc#1051510).
- pci: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- pci: Return error if cannot probe VF (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci: portdrv: Restore pci config state on slot reset (bsc#1142623).
- pci: fix IOU hotplug behavior (bsc#1141558)
- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf tools: Add Hygon Dhyana support ().
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- pinctrl/amd: add get_direction handler (bsc#1140463).
- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).
- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).
- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).
- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).
- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).
- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via pci (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).
- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).
- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).
- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_pmc_core: Add ICL platform support (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Add Package cstates residency info (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Avoid a u32 overflow (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Include Reserved IP for LTR (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Mark local function static (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Quirk to ignore XTAL shutdown (jsc#SLE-5226).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).
- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).
- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).
- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).
- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).
- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).
- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).
- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).
- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).
- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).
- platform/x86: mlx-platform: Remove unused define (bsc#1112374).
- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).
- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).
- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).
- pm/core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).
- pm: ACPI/pci: Resume all devices during hibernation (bsc#1111666).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppc64le: enable CONFIG_PPC_DT_CPU_FTRS (jsc#SLE-7159).
- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (git-fixes).
- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).
- pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).
- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).
- ras/cec: Fix binary search function (bsc#1114279).
- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).
- rdma/cxgb4: Do not expose DMA addresses (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).
- rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992).
- rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991).
- rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991).
- rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992).
- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).
- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).
- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).
- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- rpm/package-descriptions: fix typo in kernel-azure
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/airq: recognize directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).
- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).
- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).
- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).
- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).
- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).
- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).
- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).
- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).
- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).
- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).
- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: fix assignment of bus resources (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: fix struct definition for set pci function (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: improve bar check (jsc#SLE-5803).
- s390/pci: map IOV resources (jsc#SLE-5803).
- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: provide support for MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: remove stale rc (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: remove unused define (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: skip VF scanning (jsc#SLE-5803).
- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 bsc#1135153 LTC#173151).
- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 bsc#1135153 LTC#173151).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/sclp: detect DIRQ facility (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 bsc#1135153 LTC#173151).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).
- s390: enable processes for mio instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).
- s390: revert s390-setup-fix-early-warning-messages (bsc#1140948).
- s390: show statistics for MSI IRQs (jsc#SLE-5789 bsc#1134730 LTC#173388).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.
- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes
- scripts/git_sort/git_sort.py: drop old scsi branches
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).
- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).
- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: fix spelling mistake 'Retreiving' -> 'Retrieving' (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: csiostor: Remove set but not used variable 'pln' (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).
- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst->atid (jsc#SLE-4678 bsc#1136342).
- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).
- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Prevent 'use after free' memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set but not used variable 'phys_id' (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).
- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).
- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).
- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).
- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).
- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).
- scsi: megaraid_sas: correct an info message (bsc#1136271).
- scsi: megaraid_sas: driver version update (bsc#1136271).
- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for ATLAS pcie switch (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).
- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add additional checks for io_req->sc_cmd validity (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add driver state to 'driver_stats' debugfs node (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Remove set but not used variable 'fr_len' (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).
- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Fix spelling mistake 'OUSTANDING' -> 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).
- scsi: fix multipath hang (bsc#1119532).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).
- smb3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- tcp: be more careful in tcp_fragment() (bsc#1139751).
- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support ().
- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).
- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).
- tools: bpftool: fix infinite loop in map create (bsc#1109837).
- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- typec: tcpm: fix compiler warning about stupid things (git-fixes).
- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: fix initial-termios handling (bsc#1135642).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- wil6210: drop old event after wmi_call timeout (bsc#1111666).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().
- x86/CPU: Add Icelake model number (jsc#SLE-5226).
- x86/alternative: Init ideal_nops for Hygon Dhyana ().
- x86/amd_nb: Add support for Raven Ridge CPUs ().
- x86/amd_nb: Check vendor in AMD-only functions ().
- x86/apic: Add Hygon Dhyana support ().
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().
- x86/cpu: Create Hygon Dhyana architecture support file ().
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/cpufeatures: Enumerate user wait instructions (jsc#SLE-5187).
- x86/events: Add Hygon Dhyana support to PMU infrastructure ().
- x86/kvm: Add Hygon Dhyana support to kvm ().
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().
- x86/mce: Do not disable MCA banks when offlining a CPU on AMD (). This feature was requested for SLE15 but aws reverted in packaging and master.
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to pci and northbridge ().
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/umip: Make the UMIP activated message generic (bsc#1138336).
- x86/umip: Print UMIP line only once (bsc#1138336).
- x86/umwait: Add sysfs interface to control umwait C0.2 state (jsc#SLE-5187).
- x86/umwait: Add sysfs interface to control umwait maximum time (jsc#SLE-5187).
- x86/umwait: Initialize umwait control values (jsc#SLE-5187).
- x86/xen: Add Hygon Dhyana support to Xen ().
- xdp: check device pointer before clearing (bsc#1109837).
- xdp: fix possible cq entry leak (bsc#1109837).
- xdp: fix race on generic receive path (bsc#1109837).
- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).
- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).
Patchnames
SUSE-2019-2069,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2069
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel for Azure", "title": "Title of the patch" }, { "category": "description", "text": "\n\n\nThe SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in create_qp_common, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. (bnc#bsc#1103991)\n- CVE-2019-1125: Fix Spectre V1 variant via swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. (bnc#bsc#1143189)\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. (bsc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. (bsc#1134399)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)\n- CVE-2019-13631: In parse_hid_report_descriptor, a malicious usb device could send an hid: report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. (bsc#1140577)\n- CVE-2019-13233: In arch/x86/lib/insn-eval.c, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation. (bnc#1140454)\n- CVE-2018-20836: In the Linux kernel there was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. (bnc#1134395)\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)\n- CVE-2019-12817: Linux kernel for powerpc had a bug where unrelated processes could be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected. (bsc#1138263, bsc#1139619)\n- CVE-2019-12614: In dlpar_parse_cc_property there was an unchecked kstrdup of prop-\u003ename, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1137194)\n- CVE-2018-16871: An attacker, who was able to mount an exported NFS filesystem, was able to trigger a null pointer dereference by using an invalid NFS sequence. This could panic the machine and deny access to the NFS server. (bsc#1137103)\n- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() calls put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bsc#1138293)\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: Add Hygon Dhyana support ().\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpica: Clear status of GPEs on first direct enable (bsc#1111666).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- asoc: : cs4265 : readable register too low (bsc#1051510).\n- asoc:: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- asoc:: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- asoc:: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- asoc:: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc:: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: fix pciE device wake up failed (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bluetooth: Replace the bluetooth fix with the upstream commit (bsc#1135556)\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).\n- bnxt_en: Add support for BCM957504 (bsc#1137224).\n- bnxt_en: Cap the returned MSIX vectors to the rdma driver (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Disable bus master during pci shutdown and driver unload (bsc#1104745).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bnxt_en: Fix statistics context reservation logic for rdma driver (bsc#1104745).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).\n- bpf, devmap: Add missing bulk queue free (bsc#1109837).\n- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).\n- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).\n- bpf: sockmap fix msg-\u003esg.size account on ingress skb (bsc#1109837).\n- bpf: sockmap remove duplicate queue free (bsc#1109837).\n- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).\n- brcmfmac: fix NULL pointer derefence during usb disconnect (bsc#1111666).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- ceph: factor out ceph_lookup_inode() (bsc#1138681).\n- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).\n- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).\n- ceph: quota: fix quota subdir mounts (bsc#1138681).\n- ceph: remove duplicated filelock ref increase (bsc#1138681).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n- cpufreq: Add Hygon Dhyana support ().\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).\n- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: Replace WARN_TAINT_ONCE() with pr_warn_once() (jsc#SLE-5442).\n- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dmaengine: ioat: constify pci_device_id (jsc#SLE-5442).\n- dmaengine: ioat: do not use DMA_ERROR_CODE (jsc#SLE-5442).\n- dmaengine: ioat: fix prototype of ioat_enumerate_channels (jsc#SLE-5442).\n- dmaengine: ioatdma: Add Snow Ridge ioatdma device id (jsc#SLE-5442).\n- dmaengine: ioatdma: Add intr_coalesce sysfs entry (jsc#SLE-5442).\n- dmaengine: ioatdma: add descriptor pre-fetch support for v3.4 (jsc#SLE-5442).\n- dmaengine: ioatdma: disable DCA enabling on IOATDMA v3.4 (jsc#SLE-5442).\n- dmaengine: ioatdma: set the completion address register after channel reset (jsc#SLE-5442).\n- dmaengine: ioatdma: support latency tolerance report (LTR) for v3.4 (jsc#SLE-5442).\n- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).\n- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).\n- dmaengine: tegra210-adma: restore channel status (bsc#1111666).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- documentation/ABI: Document umwait control sysfs interfaces (jsc#SLE-5187).\n- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base/devres: introduce devm_release_action() (bsc#1103992).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers/dma/ioat: Remove now-redundant smp_read_barrier_depends() (jsc#SLE-5442).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/amd/display: Set stream-\u003emode_changed when connectors change (bsc#1111666).\n- drm/amd/display: Use plane-\u003ecolor_space for dpp if specified (bsc#1111666).\n- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).\n- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).\n- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).\n- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).\n- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).\n- drm/fb-helper: generic: Do not take module ref for fbcon (bsc#1111666).\n- drm/i915/aml: Add new Amber Lake pci ID (jsc#SLE-4986).\n- drm/i915/cfl: Adding another pci Device ID (jsc#SLE-4986).\n- drm/i915/cml: Add CML pci IDS (jsc#SLE-4986).\n- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/i915: Add new AML_ULX support list (jsc#SLE-4986).\n- drm/i915: Add new ICL pci ID (jsc#SLE-4986).\n- drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).\n- drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).\n- drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).\n- drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).\n- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).\n- drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).\n- drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).\n- drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).\n- drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).\n- drm/i915: Split some pci ids into separate groups (jsc#SLE-4986).\n- drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).\n- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).\n- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).\n- drm/lease: Make sure implicit planes are leased (bsc#1111666).\n- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).\n- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).\n- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).\n- drm/mediatek: fix unbind functions (bsc#1111666).\n- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).\n- drm/msm: fix fb references in async update (bsc#1111666).\n- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).\n- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).\n- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).\n- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).\n- drm/pl111: fix possible object reference leak (bsc#1111666).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).\n- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/v3d: Handle errors from IRQ setup (bsc#1111666).\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).\n- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).\n- drm: Fix drm_release() and device unplug (bsc#1111666).\n- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).\n- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).\n- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).\n- drm: do not block fb changes for async plane updates (bsc#1111666).\n- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- edac, amd64: Add Hygon Dhyana support ().\n- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).\n- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).\n- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- fs: Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- fs: kill btrfs clear path blocking (bsc#1140139).\n- fs: Btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- hid:: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- hid:: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- hid:: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- hid:: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- hid:: wacom: Add support for Pro Pen slim (bsc#1051510).\n- hid:: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- hid:: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n- hid:: wacom: Do not set tool type until we\u0027re in range (bsc#1051510).\n- hid:: wacom: Mark expected switch fall-through (bsc#1051510).\n- hid:: wacom: Move handling of hid: quirks into a dedicated function (bsc#1051510).\n- hid:: wacom: Move hid: fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- hid:: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- hid:: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- hid:: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- hid:: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- hid:: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- hid:: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- hid:: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- hid:: wacom: Work around hid: descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hid:: wacom: convert Wacom custom usages to standard hid: usages (bsc#1051510).\n- hid:: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid:: wacom: fix mistake in printk (bsc#1051510).\n- hid:: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid:: wacom: generic: Ignore hid:_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- hid:: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- hid:: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- hid:: wacom: generic: Report AES battery information (bsc#1051510).\n- hid:: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- hid:: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- hid:: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- hid:: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- hid:: wacom: generic: Support multiple tools per report (bsc#1051510).\n- hid:: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- hid:: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- hid:: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid:: wacom: generic: read hid:_DG_CONTACTMAX from any feature report (bsc#1051510).\n- hid:: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n- hv/netvsc: Set probe mode to sync (bsc#1142083).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().\n- hwmon: (k10temp) Add Hygon Dhyana support ().\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().\n- hwmon: (k10temp) Add support for family 17h ().\n- hwmon: (k10temp) Add support for temperature offsets ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().\n- hwmon: (k10temp) Correct model name for Ryzen 1600X ().\n- hwmon: (k10temp) Display both Tctl and Tdie ().\n- hwmon: (k10temp) Fix reading critical temperature register ().\n- hwmon: (k10temp) Make function get_raw_temp static ().\n- hwmon: (k10temp) Move chip specific code into probe function ().\n- hwmon: (k10temp) Only apply temperature offset if result is positive ().\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().\n- hwmon: (k10temp) Use API function to access System Management Network ().\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().\n- i2c-piix4: Add Hygon Dhyana SMBus support ().\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).\n- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).\n- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).\n- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).\n- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).\n- ib/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685).\n- ib/hfi1: Create inline to get extended headers (bsc#1114685 ).\n- ib/hfi1: Validate fault injection opcode user input (bsc#1114685 ).\n- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).\n- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).\n- ib/mlx5: Verify DEVX general object type correctly (bsc#1103991 ).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle RMRR with pci bridge device scopes (bsc#1140961).\n- iommu/vt-d: Handle pci bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).\n- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).\n- iwlwifi: Correct iwlwifi 22000 series ucode file name (bsc#1142673)\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: correct one of the pci struct names (bsc#1111666).\n- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with pci Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).\n- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kABI workaround for asus-wmi changes (bsc#1051510).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kABI: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi/severities: Whitelist airq_iv_* (s390-specific)\n- kabi/severities: Whitelist more s390x internal symbols\n- kabi/severities: Whitelist s390 internal-only symbols\n- kabi: Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 ).\n- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel-binary: Use -c grep option in klp project detection.\n- kernel-binary: fix missing \\\n- kernel-binary: rpm does not support multiline condition\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- kvm: x86: fix return value for reserved EFER (bsc#1140992).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: preallocate message data items (bsc#1135897).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).\n- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).\n- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).\n- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).\n- mlxsw: pci: Reincrease pci reset timeout (bsc#1112374).\n- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).\n- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).\n- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm/page_alloc.c: avoid potential NULL pointer dereference (git fixes (mm/pagealloc)).\n- mm/page_alloc.c: fix never set ALLOC_NOFRAGMENT flag (git fixes (mm/pagealloc)).\n- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: complete HS400 before checking status (bsc#1111666).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net/mlx5: Avoid reloading already removed devices (bsc#1103990 ).\n- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990).\n- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 ).\n- net/mlx5: Set completion EQs as shared resources (bsc#1103991 ).\n- net/mlx5: Update pci error handler entries and command translation (bsc#1103991).\n- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990).\n- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 ).\n- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990).\n- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 ).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).\n- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 ).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).\n- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).\n- net/tls: avoid NULL pointer deref on nskb-\u003esk in fallback (bsc#1109837).\n- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).\n- net/tls: do not copy negative amounts of data in reencrypt (bsc#1109837).\n- net/tls: do not ignore netdev notifications if no TLS features (bsc#1109837).\n- net/tls: do not leak IV and record seq when offload fails (bsc#1109837).\n- net/tls: do not leak partially sent record in device mode (bsc#1109837).\n- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).\n- net/tls: fix copy to fragments in reencrypt (bsc#1109837).\n- net/tls: fix page double free on TX cleanup (bsc#1109837).\n- net/tls: fix refcount adjustment in fallback (bsc#1109837).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: fix state removal with feature flags off (bsc#1109837).\n- net/tls: fix the IV leaks (bsc#1109837).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).\n- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).\n- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).\n- net: Fix missing meta data in skb with vlan packet (bsc#1109837).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: core: support XDP generic on stacked devices (bsc#1109837).\n- net: do not clear sock-\u003esk early to avoid trouble in strparser (bsc#1103990).\n- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).\n- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).\n- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).\n- net: ena: add good checksum counter (bsc#1138879).\n- net: ena: add handling of llq max tx burst size (bsc#1138879).\n- net: ena: add newline at the end of pr_err prints (bsc#1138879).\n- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).\n- net: ena: allow automatic fallback to polling mode (bsc#1138879).\n- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).\n- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).\n- net: ena: enable negotiating larger Rx ring size (bsc#1138879).\n- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).\n- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).\n- net: ena: fix incorrect test of supported hash function (bsc#1138879).\n- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).\n- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).\n- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).\n- net: ena: gcc 8: fix compilation warning (bsc#1138879).\n- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).\n- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).\n- net: ena: optimise calculations for CQ doorbell (bsc#1138879).\n- net: ena: remove inline keyword from functions in *.c (bsc#1138879).\n- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).\n- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).\n- net: ena: use dev_info_once instead of static variable (bsc#1138879).\n- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).\n- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).\n- nfs: Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- nl80211: fix station_info pertid memory leak (bsc#1051510).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for pcie ports (bsc#1142623).\n- pci/AER: Use cached AER Capability offset (bsc#1142623).\n- pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803).\n- pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803).\n- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).\n- pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992).\n- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- pci/portdrv: Consolidate comments (bsc#1142623).\n- pci/portdrv: Disable port driver in compat mode (bsc#1142623).\n- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- pci/portdrv: Support pcie services on subtractive decode bridges (bsc#1142623).\n- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).\n- pci: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- pci: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: portdrv: Restore pci config state on slot reset (bsc#1142623).\n- pci: fix IOU hotplug behavior (bsc#1141558)\n- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf tools: Add Hygon Dhyana support ().\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- pinctrl/amd: add get_direction handler (bsc#1140463).\n- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).\n- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).\n- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).\n- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).\n- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).\n- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via pci (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).\n- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).\n- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).\n- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_pmc_core: Add ICL platform support (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Add Package cstates residency info (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Avoid a u32 overflow (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Include Reserved IP for LTR (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Mark local function static (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Quirk to ignore XTAL shutdown (jsc#SLE-5226).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).\n- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).\n- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).\n- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).\n- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).\n- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).\n- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).\n- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).\n- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).\n- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).\n- platform/x86: mlx-platform: Remove unused define (bsc#1112374).\n- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).\n- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).\n- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).\n- pm/core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- pm: ACPI/pci: Resume all devices during hibernation (bsc#1111666).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppc64le: enable CONFIG_PPC_DT_CPU_FTRS (jsc#SLE-7159).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME (git-fixes).\n- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n- pwm: stm32: Use 3 cells -\u003eof_xlate() (bsc#1111666).\n- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).\n- ras/cec: Fix binary search function (bsc#1114279).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rdma/cxgb4: Do not expose DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).\n- rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992).\n- rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991).\n- rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991).\n- rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992).\n- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).\n- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).\n- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).\n- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).\n- rds: ib: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- rpm/package-descriptions: fix typo in kernel-azure\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/airq: recognize directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).\n- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).\n- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).\n- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).\n- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).\n- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).\n- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).\n- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: fix assignment of bus resources (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: fix struct definition for set pci function (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: improve bar check (jsc#SLE-5803).\n- s390/pci: map IOV resources (jsc#SLE-5803).\n- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: provide support for MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: remove stale rc (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: remove unused define (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: skip VF scanning (jsc#SLE-5803).\n- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/sclp: detect DIRQ facility (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).\n- s390: enable processes for mio instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).\n- s390: revert s390-setup-fix-early-warning-messages (bsc#1140948).\n- s390: show statistics for MSI IRQs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n- scripts/git_sort/git_sort.py: drop old scsi branches\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).\n- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: fix spelling mistake \u0027Retreiving\u0027 -\u003e \u0027Retrieving\u0027 (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: csiostor: Remove set but not used variable \u0027pln\u0027 (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst-\u003eatid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).\n- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).\n- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).\n- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).\n- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).\n- scsi: megaraid_sas: correct an info message (bsc#1136271).\n- scsi: megaraid_sas: driver version update (bsc#1136271).\n- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for ATLAS pcie switch (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add additional checks for io_req-\u003esc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 -\u003e \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: fix multipath hang (bsc#1119532).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n- smb3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: be more careful in tcp_fragment() (bsc#1139751).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support ().\n- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: fix infinite loop in map create (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- typec: tcpm: fix compiler warning about stupid things (git-fixes).\n- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: fix initial-termios handling (bsc#1135642).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/CPU: Add Icelake model number (jsc#SLE-5226).\n- x86/alternative: Init ideal_nops for Hygon Dhyana ().\n- x86/amd_nb: Add support for Raven Ridge CPUs ().\n- x86/amd_nb: Check vendor in AMD-only functions ().\n- x86/apic: Add Hygon Dhyana support ().\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n- x86/cpu: Create Hygon Dhyana architecture support file ().\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/cpufeatures: Enumerate user wait instructions (jsc#SLE-5187).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n- x86/kvm: Add Hygon Dhyana support to kvm ().\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD (). This feature was requested for SLE15 but aws reverted in packaging and master.\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to pci and northbridge ().\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/umip: Make the UMIP activated message generic (bsc#1138336).\n- x86/umip: Print UMIP line only once (bsc#1138336).\n- x86/umwait: Add sysfs interface to control umwait C0.2 state (jsc#SLE-5187).\n- x86/umwait: Add sysfs interface to control umwait maximum time (jsc#SLE-5187).\n- x86/umwait: Initialize umwait control values (jsc#SLE-5187).\n- x86/xen: Add Hygon Dhyana support to Xen ().\n- xdp: check device pointer before clearing (bsc#1109837).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2069,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2069", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2069-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2069-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192069-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2069-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1125703", "url": "https://bugzilla.suse.com/1125703" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1127611", "url": "https://bugzilla.suse.com/1127611" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130836", "url": "https://bugzilla.suse.com/1130836" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134090", "url": "https://bugzilla.suse.com/1134090" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1134730", "url": "https://bugzilla.suse.com/1134730" }, { "category": "self", "summary": "SUSE Bug 1134738", "url": "https://bugzilla.suse.com/1134738" }, { "category": "self", "summary": "SUSE Bug 1135153", "url": "https://bugzilla.suse.com/1135153" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135897", "url": "https://bugzilla.suse.com/1135897" }, { "category": "self", "summary": "SUSE Bug 1136156", "url": "https://bugzilla.suse.com/1136156" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136161", "url": "https://bugzilla.suse.com/1136161" }, { "category": "self", "summary": "SUSE Bug 1136217", "url": "https://bugzilla.suse.com/1136217" }, { "category": "self", "summary": "SUSE Bug 1136264", "url": "https://bugzilla.suse.com/1136264" }, { "category": "self", "summary": "SUSE Bug 1136271", "url": "https://bugzilla.suse.com/1136271" }, { "category": "self", "summary": "SUSE Bug 1136333", "url": "https://bugzilla.suse.com/1136333" }, { "category": "self", "summary": "SUSE Bug 1136342", "url": "https://bugzilla.suse.com/1136342" }, { "category": "self", "summary": "SUSE Bug 1136343", "url": "https://bugzilla.suse.com/1136343" }, { "category": "self", "summary": "SUSE Bug 1136345", "url": "https://bugzilla.suse.com/1136345" }, { "category": "self", "summary": "SUSE Bug 1136348", "url": "https://bugzilla.suse.com/1136348" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1136462", "url": "https://bugzilla.suse.com/1136462" }, { "category": "self", "summary": "SUSE Bug 1136467", "url": "https://bugzilla.suse.com/1136467" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137224", "url": "https://bugzilla.suse.com/1137224" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137586", "url": "https://bugzilla.suse.com/1137586" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137985", "url": "https://bugzilla.suse.com/1137985" }, { "category": "self", "summary": "SUSE Bug 1138263", "url": "https://bugzilla.suse.com/1138263" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138336", "url": "https://bugzilla.suse.com/1138336" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138681", "url": "https://bugzilla.suse.com/1138681" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1138732", "url": "https://bugzilla.suse.com/1138732" }, { "category": "self", "summary": "SUSE Bug 1138874", "url": "https://bugzilla.suse.com/1138874" }, { "category": "self", "summary": "SUSE Bug 1138879", "url": "https://bugzilla.suse.com/1138879" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139619", "url": "https://bugzilla.suse.com/1139619" }, { "category": "self", "summary": "SUSE Bug 1139712", "url": "https://bugzilla.suse.com/1139712" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140228", "url": "https://bugzilla.suse.com/1140228" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140454", "url": "https://bugzilla.suse.com/1140454" }, { "category": "self", "summary": "SUSE Bug 1140463", "url": "https://bugzilla.suse.com/1140463" }, { "category": "self", "summary": "SUSE Bug 1140559", "url": "https://bugzilla.suse.com/1140559" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140676", "url": "https://bugzilla.suse.com/1140676" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141312", "url": "https://bugzilla.suse.com/1141312" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142052", "url": "https://bugzilla.suse.com/1142052" }, { "category": "self", "summary": "SUSE Bug 1142083", "url": "https://bugzilla.suse.com/1142083" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142115", "url": "https://bugzilla.suse.com/1142115" }, { "category": "self", "summary": "SUSE Bug 1142119", "url": "https://bugzilla.suse.com/1142119" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142265", "url": "https://bugzilla.suse.com/1142265" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142623", "url": "https://bugzilla.suse.com/1142623" }, { "category": "self", "summary": "SUSE Bug 1142673", "url": "https://bugzilla.suse.com/1142673" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143209", "url": "https://bugzilla.suse.com/1143209" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12817 page", "url": "https://www.suse.com/security/cve/CVE-2019-12817/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13233 page", "url": "https://www.suse.com/security/cve/CVE-2019-13233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel for Azure", "tracking": { "current_release_date": "2019-08-06T22:50:58Z", "generator": { "date": "2019-08-06T22:50:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2069-1", "initial_release_date": "2019-08-06T22:50:58Z", "revision_history": [ { "date": "2019-08-06T22:50:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-8.13.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-8.13.1.noarch", "product_id": "kernel-devel-azure-4.12.14-8.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-8.13.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-8.13.1.noarch", "product_id": "kernel-source-azure-4.12.14-8.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-base-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-livepatch-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-livepatch-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-8.13.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-8.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-8.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-8.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-8.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-8.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-8.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-8.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-8.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-8.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-8.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-8.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-8.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-8.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12817" } ], "notes": [ { "category": "general", "text": "arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12817", "url": "https://www.suse.com/security/cve/CVE-2019-12817" }, { "category": "external", "summary": "SUSE Bug 1138263 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138263" }, { "category": "external", "summary": "SUSE Bug 1138264 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "important" } ], "title": "CVE-2019-12817" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-12819" }, { "cve": "CVE-2019-13233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13233" } ], "notes": [ { "category": "general", "text": "In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13233", "url": "https://www.suse.com/security/cve/CVE-2019-13233" }, { "category": "external", "summary": "SUSE Bug 1140454 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1140454" }, { "category": "external", "summary": "SUSE Bug 1144502 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1144502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-13233" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
suse-su-2019:2430-1
Vulnerability from csaf_suse
Published
2019-09-23 07:31
Modified
2019-09-23 07:31
Summary
Security update for kernel-source-rt
Notes
Title of the patch
Security update for kernel-source-rt
Description of the patch
The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130: Microarchitectural Store Buffer Data Sampling (MSBDS): Stored buffers on some microprocessors utilizing speculative execution which may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1103186)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1111331)
- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1136586)
- CVE-2019-10124: An issue was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() runs on a thp tail page after pmd is split, an attacker could cause a denial of service (bsc#1130699).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel has multiple race conditions. (bsc#1133188)
- CVE-2019-11811: An issue was discovered in the Linux kernel There was a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module was removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. (bsc#1134397)
- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests. (bsc#1133190)
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)
- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem. (bsc#1135281)
- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bsc#1120843)
- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bsc#1135603)
- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a '\0' character. (bsc#1134848)
- CVE-2019-9500: An issue was discovered that lead to brcmfmac heap buffer overflow. (bsc#1132681)
- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bsc#1135278)
- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bsc#1135278)
- CVE-2018-16880: A flaw was found in the Linux kernel's handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, could trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may have lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (bsc#1122767)
- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)
- CVE-2019-3882: A flaw was found in the Linux kernel's vfio interface implementation that permitted violation of the user's locked memory limit. If a device was bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may have caused a system memory exhaustion and thus a denial of service (DoS). (bsc#1131427)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bsc#1136424)
- CVE-2019-8564: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132673)
- CVE-2019-9503: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132828)
- CVE-2019-9003: In the Linux kernel, attackers could trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a 'service ipmievd restart' loop. (bsc#1126704)
- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.
- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.
- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-12817: On the PowerPC architecture, local attackers could access other users processes memory (bnc#1138263).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image was exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).
- CVE-2019-13233: In arch/x86/lib/insn-eval.c in the Linux kernel, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).
- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. (bnc#1143189)
- CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used. (bsc#1136922)
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. (bsc#1136598)
The following non-security bugs were fixed:
- 6lowpan: Off by one handling nexthdr (bsc#1051510).
- 9p locks: add mount option for lock retry interval (bsc#1051510).
- 9p: do not trust pdu content for stat item size (bsc#1051510).
- ARM: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).
- ARM: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).
- ARM: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).
- ARM: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).
- ARM: OMAP2+: Variable 'reg' in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).
- ARM: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).
- ARM: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).
- ARM: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).
- ARM: iop: don't use using 64-bit DMA masks (bsc#1051510).
- ARM: orion: don't use using 64-bit DMA masks (bsc#1051510).
- ARM: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).
- ARM: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).
- ARM: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).
- ASoC : cs4265 : readable register too low (bsc#1051510).
- ASoC: Intel: avoid Oops if DMA setup fails (bsc#1051510).
- ASoC: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).
- ASoC: cs4270: Set auto-increment bit for register writes (bsc#1051510).
- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).
- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: fix valid stream condition (bsc#1051510).
- ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bsc#1051510).
- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- ASoC: fsl_esai: Fix missing break in switch statement (bsc#1051510).
- ASoC: fsl_esai: fix channel swap issue when stream starts (bsc#1051510).
- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).
- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: hdmi-codec: fix S/PDIF DAI (bsc#1051510).
- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).
- ASoC: max98090: Fix restore of DAPM Muxes (bsc#1051510).
- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- ASoC: nau8810: fix the issue of widget with prefixed name (bsc#1051510).
- ASoC: nau8824: fix the issue of the widget with prefix name (bsc#1051510).
- ASoC: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).
- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ASoC: stm32: fix sai driver name initialisation (bsc#1051510).
- ASoC: tlv320aic32x4: Fix Common Pins (bsc#1051510).
- ASoC: topology: free created components in tplg load error (bsc#1051510).
- ASoC: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).
- ASoC:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).
- Abort file_remove_privs() for non-reg. files (bsc#1140888).
- Add back sibling paca poiter to paca (bsc#1055117).
- Backporting hwpoison fixes
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).
- Bluetooth: btusb: request wake pin with NOAUTOEN (bsc#1051510).
- Bluetooth: hidp: fix buffer overflow (bsc#1051510).
- CIFS: Do not count -ENODATA as failure for query directory (bsc#1051510).
- CIFS: Do not hide EINTR after sending network packets (bsc#1051510).
- CIFS: Do not reconnect TCP session in add_credits() (bsc#1051510).
- CIFS: Do not reset lease state to NONE on lease break (bsc#1051510).
- CIFS: Fix adjustment of credits for MTU requests (bsc#1051510).
- CIFS: Fix credit calculation for encrypted reads with errors (bsc#1051510).
- CIFS: Fix credits calculations for reads with errors (bsc#1051510).
- CIFS: Fix possible hang during async MTU reads and writes (bsc#1051510).
- CIFS: Fix read after write for files with read caching (bsc#1051510).
- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).
- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).
- Correct iwlwifi 22000 series ucode file name (bsc#1142673)
- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)
- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).
- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).
- Disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bsc#1051510).
- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).
- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).
- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).
- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- Fix cpu online check (bsc#1051510).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- HID: core: move Usage Page concatenation to Main item (bsc#1093389).
- HID: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).
- HID: input: add mapping for 'Toggle Display' key (bsc#1051510).
- HID: input: add mapping for Assistant key (bsc#1051510).
- HID: input: add mapping for Expose/Overview key (bsc#1051510).
- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).
- HID: intel-ish-hid: avoid binding wrong ishtp_cl_device (bsc#1051510).
- HID: intel-ish: ipc: handle PIMR before ish_wakeup also clear PISR busy_clear bit (bsc#1051510).
- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).
- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).
- HID: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).
- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- HID: wacom: Add support for Pro Pen slim (bsc#1051510).
- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- HID: wacom: Don't report anything prior to the tool entering range (bsc#1051510).
- HID: wacom: Don't set tool type until we're in range (bsc#1051510).
- HID: wacom: Mark expected switch fall-through (bsc#1051510).
- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- HID: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- HID: wacom: correct touch resolution x/y typo (bsc#1051510).
- HID: wacom: fix mistake in printk (bsc#1051510).
- HID: wacom: generic: Correct pad syncing (bsc#1051510).
- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).
- HID: wacom: generic: Report AES battery information (bsc#1051510).
- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- HID: wacom: generic: Support multiple tools per report (bsc#1051510).
- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- HID: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685 FATE#325854).
- IB/hfi1: Create inline to get extended headers (bsc#1114685 FATE#325854).
- IB/hfi1: Validate fault injection opcode user input (bsc#1114685 FATE#325854).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1103992 FATE#326009).
- IB/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991 FATE#326007).
- IB/mlx5: Verify DEVX general object type correctly (bsc#1103991 FATE#326007).
- Improve the headset mic for Acer Aspire laptops' (bsc#1051510).
- Input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).
- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- Input: introduce KEY_ASSISTANT (bsc#1051510).
- Input: psmouse - fix build error of multiple definition (bsc#1051510).
- Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bsc#1051510).
- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- Input: synaptics-rmi4 - fix possible double free (bsc#1051510).
- Input: synaptics-rmi4 - write config register values to the right offset (bsc#1051510).
- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- KEYS: always initialize keyring_index_key::desc_len (bsc#1051510).
- KEYS: user: Align the payload buffer (bsc#1051510).
- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).
- KVM: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).
- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).
- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).
- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).
- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).
- KVM: PPC: Validate all tces before updating tables (bsc#1061840).
- KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1114279).
- MD: fix invalid stored role for a disk (bsc#1051510).
- NFC: nci: Add some bounds checking in nci_hci_cmd_received() (bsc#1051510).
- PCI/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992 FATE#326009).
- PCI: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bsc#1051510).
- PCI: Always allow probing with driver_override (bsc#1051510).
- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).
- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).
- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).
- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- PCI: Return error if cannot probe VF (bsc#1051510).
- PCI: designware-ep: Read-only registers need DBI_RO_WR_EN to be writable (bsc#1051510).
- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- PM / core: Propagate dev power.wakeup_path when no callbacks (bsc#1051510).
- RAS/CEC: Check the correct variable in the debugfs error handling (bsc#1085535).
- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).
- RAS/CEC: Fix binary search function (bsc#1114279).
- RDMA/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992 FATE#326009).
- RDMA/mlx5: Do not allow the user to write to the clock page (bsc#1103991 FATE#326007).
- RDMA/mlx5: Initialize roce port info before multiport master init (bsc#1103991 FATE#326007).
- RDMA/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992 FATE#326009).
- RDMA/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992 FATE#326009).
- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).
- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).
- RDMA/srp: Accept again source addresses that do not have a port number (bsc#1103992 FATE#326009).
- RDMA/srp: Document srp_parse_in() arguments (bsc#1103992 FATE#326009).
- RDMA/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992 FATE#326009).
- Re-export snd_cards for kABI compatibility (bsc#1051510).
- Revert 'Sign non-x86 kernels when possible (boo#1134303)'
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'net: ena: ethtool: add extra properties retrieval via get_priv_flags' (bsc#1138879).
- Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).' This broke the build with older gcc instead.
- Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).
- Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).
- SMB3: Fix endian warning (bsc#1137884).
- UAS: fix alignment of scatter/gather segments (bsc#1129770).
- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).
- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).
- USB: cdc-acm: fix unthrottle races (bsc#1051510).
- USB: core: Don't unbind interfaces following device reset failure (bsc#1051510).
- USB: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).
- USB: core: Fix unterminated string returned by usb_string() (bsc#1051510).
- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).
- USB: rio500: refuse more than one device at a time (bsc#1051510).
- USB: serial: cp210x: fix GPIO in autosuspend (bsc#1120902).
- USB: serial: f81232: fix interrupt worker not stop (bsc#1051510).
- USB: serial: fix unthrottle races (bsc#1051510).
- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).
- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- USB: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).
- USB: yurex: Fix protection fault after device removal (bsc#1051510).
- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- acpi / SBS: Fix GPE storm on recent MacBookPro's (bsc#1051510).
- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).
- acpi / utils: Drop reference in test for device presence (bsc#1051510).
- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).
- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- acpi: PM: Set enable_for_wake for wakeup GPEs during suspend-to-idle (bsc#1111666).
- acpi: button: reinitialize button state upon resume (bsc#1051510).
- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).
- acpi: property: restore _DSD data subnodes GUID comment (bsc#1111666).
- acpiCA: AML interpreter: add region addresses in global list during initialization (bsc#1051510).
- acpiCA: Clear status of GPEs on first direct enable (bsc#1111666).
- acpiCA: Namespace: remove address node from global list after method termination (bsc#1051510).
- af_key: unconditionally clone on broadcast (bsc#1051510).
- alsa: PCM: check if ops are defined before suspending PCM (bsc#1051510).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Don't allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: core: Don't refer to snd_cards array directly (bsc#1051510).
- alsa: core: Fix card races between register and disconnect (bsc#1051510).
- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Add two more machines to the power_save_blacklist (bsc#1051510).
- alsa: hda - Don't resume forcibly i915 HDMI/DP codec (bsc#1111666).
- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).
- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).
- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).
- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).
- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).
- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).
- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).
- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).
- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).
- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).
- alsa: hda/realtek - EAPD turn on later (bsc#1051510).
- alsa: hda/realtek - Enable micmute LED for Huawei laptops (bsc#1051510).
- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).
- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).
- alsa: hda/realtek - Move to ACT_INIT state (bsc#1111666).
- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).
- alsa: hda/realtek - Support low power consumption for ALC256 (bsc#1051510).
- alsa: hda/realtek - Support low power consumption for ALC295 (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: hda/realtek - add two more pin configuration sets to quirk table (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: hda/realtek: Enable headset MIC of Acer TravelMate B114-21 with ALC233 (bsc#1111666).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda: Initialize power_state field properly (bsc#1051510).
- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).
- alsa: info: Fix racy addition/deletion of nodes (bsc#1051510).
- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: line6: use dynamic buffers (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).
- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).
- alsa: seq: Fix OOB-reads from strlcpy (bsc#1051510).
- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).
- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).
- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).
- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).
- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).
- alsa: timer: Coding style fixes (bsc#1051510).
- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).
- alsa: timer: Make sure to clear pending ack list (bsc#1051510).
- alsa: timer: Revert active callback sync check at close (bsc#1051510).
- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).
- alsa: timer: Unify timer callback process code (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).
- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).
- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- alsa: usx2y: fix a double free bug (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- appletalk: Fix compile regression (bsc#1051510).
- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).
- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).
- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).
- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).
- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).
- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- arm64: fix acpi dependencies (bsc#1117158).
- assume flash part size to be 4MB, if it can't be determined (bsc#1127371).
- at76c50x-usb: Don't register led_trigger if usb_register_driver failed (bsc#1051510).
- ath10k: Do not send probe response template for mesh (bsc#1111666).
- ath10k: Fix encoding for protected management frames (bsc#1111666).
- ath10k: add missing error handling (bsc#1111666).
- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).
- ath10k: avoid possible string overflow (bsc#1051510).
- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).
- ath10k: fix PCIE device wake up failed (bsc#1111666).
- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).
- ath10k: snoc: fix unbalanced clock error handling (bsc#1111666).
- ath6kl: add some bounds checking (bsc#1051510).
- ath9k: Check for errors when reading SREV register (bsc#1111666).
- ath9k: correctly handle short radar pulses (bsc#1111666).
- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).
- audit: fix a memleak caused by auditing load module (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).
- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).
- batman-adv: Reduce claim hash refcnt only for removed entry (bsc#1051510).
- batman-adv: Reduce tt_global hash refcnt only for removed entry (bsc#1051510).
- batman-adv: Reduce tt_local hash refcnt only for removed entry (bsc#1051510).
- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: Move couple of functions to sysfs.c (bsc#1130972).
- bcache: Move couple of functions to sysfs.c (bsc#1130972).
- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).
- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).
- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).
- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).
- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).
- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set flush_btree in bch_journal_free' (bsc#1140652).
- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).
- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add MODULE_DESCRIPTION information (bsc#1130972).
- bcache: add MODULE_DESCRIPTION information (bsc#1130972).
- bcache: add a comment in super.c (bsc#1130972).
- bcache: add a comment in super.c (bsc#1130972).
- bcache: add code comments for bset.c (bsc#1130972).
- bcache: add code comments for bset.c (bsc#1130972).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: add comment for cache_set fill_iter (bsc#1130972).
- bcache: add comment for cache_set fill_iter (bsc#1130972).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(b write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add identifier names to arguments of function definitions (bsc#1130972).
- bcache: add identifier names to arguments of function definitions (bsc#1130972).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add missing SPDX header (bsc#1130972).
- bcache: add missing SPDX header (bsc#1130972).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).
- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).
- bcache: add static const prefix to char * array declarations (bsc#1130972).
- bcache: add static const prefix to char * array declarations (bsc#1130972).
- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).
- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).
- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).
- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).
- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: correct dirty data statistics (bsc#1130972).
- bcache: correct dirty data statistics (bsc#1130972).
- bcache: destroy dc writeback_write_wq if failed to create dc writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not assign in if condition in bcache_init() (bsc#1130972).
- bcache: do not assign in if condition in bcache_init() (bsc#1130972).
- bcache: do not assign in if condition register_bcache() (bsc#1130972).
- bcache: do not assign in if condition register_bcache() (bsc#1130972).
- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).
- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).
- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).
- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).
- bcache: do not clone bio in bch_data_verify (bsc#1130972).
- bcache: do not clone bio in bch_data_verify (bsc#1130972).
- bcache: do not mark writeback_running too early (bsc#1130972).
- bcache: do not mark writeback_running too early (bsc#1130972).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: export backing_dev_name via sysfs (bsc#1130972).
- bcache: export backing_dev_name via sysfs (bsc#1130972).
- bcache: export backing_dev_uuid via sysfs (bsc#1130972).
- bcache: export backing_dev_uuid via sysfs (bsc#1130972).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix code comments style (bsc#1130972).
- bcache: fix code comments style (bsc#1130972).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix indent by replacing blank by tabs (bsc#1130972).
- bcache: fix indent by replacing blank by tabs (bsc#1130972).
- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).
- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).
- bcache: fix input integer overflow of congested threshold (bsc#1130972).
- bcache: fix input integer overflow of congested threshold (bsc#1130972).
- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).
- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).
- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).
- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).
- bcache: fix input overflow to journal_delay_ms (bsc#1130972).
- bcache: fix input overflow to journal_delay_ms (bsc#1130972).
- bcache: fix input overflow to sequential_cutoff (bsc#1130972).
- bcache: fix input overflow to sequential_cutoff (bsc#1130972).
- bcache: fix input overflow to writeback_delay (bsc#1130972).
- bcache: fix input overflow to writeback_delay (bsc#1130972).
- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).
- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).
- bcache: fix ioctl in flash device (bsc#1130972).
- bcache: fix ioctl in flash device (bsc#1130972).
- bcache: fix mistaken code comments in bcache.h (bsc#1130972).
- bcache: fix mistaken code comments in bcache.h (bsc#1130972).
- bcache: fix mistaken comments in request.c (bsc#1130972).
- bcache: fix mistaken comments in request.c (bsc#1130972).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix typo 'succesfully' to 'successfully' (bsc#1130972).
- bcache: fix typo 'succesfully' to 'successfully' (bsc#1130972).
- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).
- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).
- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).
- bcache: introduce force_wake_up_gc() (bsc#1130972).
- bcache: introduce force_wake_up_gc() (bsc#1130972).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).
- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: move open brace at end of function definitions to next line (bsc#1130972).
- bcache: move open brace at end of function definitions to next line (bsc#1130972).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: never writeback a discard operation (bsc#1130972).
- bcache: never writeback a discard operation (bsc#1130972).
- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).
- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: option to automatically run gc thread after writeback (bsc#1130972).
- bcache: option to automatically run gc thread after writeback (bsc#1130972).
- bcache: panic fix for making cache device (bsc#1130972).
- bcache: panic fix for making cache device (bsc#1130972).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: prefer 'help' in Kconfig (bsc#1130972).
- bcache: prefer 'help' in Kconfig (bsc#1130972).
- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).
- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).
- bcache: recal cached_dev_sectors on detach (bsc#1130972).
- bcache: recal cached_dev_sectors on detach (bsc#1130972).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).
- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).
- bcache: remove unused bch_passthrough_cache (bsc#1130972).
- bcache: remove unused bch_passthrough_cache (bsc#1130972).
- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).
- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).
- bcache: replace '%pF' by '%pS' in seq_printf() (bsc#1130972).
- bcache: replace '%pF' by '%pS' in seq_printf() (bsc#1130972).
- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).
- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).
- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).
- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).
- bcache: replace printk() by pr_*() routines (bsc#1130972).
- bcache: replace printk() by pr_*() routines (bsc#1130972).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: set largest seq to ja seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: set writeback_percent in a flexible range (bsc#1130972).
- bcache: set writeback_percent in a flexible range (bsc#1130972).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: split combined if-condition code into separate ones (bsc#1130972).
- bcache: split combined if-condition code into separate ones (bsc#1130972).
- bcache: stop bcache device when backing device is offline (bsc#1130972).
- bcache: stop bcache device when backing device is offline (bsc#1130972).
- bcache: stop using the deprecated get_seconds() (bsc#1130972).
- bcache: stop using the deprecated get_seconds() (bsc#1130972).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: style fix to add a blank line after declarations (bsc#1130972).
- bcache: style fix to add a blank line after declarations (bsc#1130972).
- bcache: style fix to replace 'unsigned' by 'unsigned int' (bsc#1130972).
- bcache: style fix to replace 'unsigned' by 'unsigned int' (bsc#1130972).
- bcache: style fixes for lines over 80 characters (bsc#1130972).
- bcache: style fixes for lines over 80 characters (bsc#1130972).
- bcache: treat stale and dirty keys as bad keys (bsc#1130972).
- bcache: treat stale and dirty keys as bad keys (bsc#1130972).
- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).
- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).
- bcache: update comment for bch_data_insert (bsc#1130972).
- bcache: update comment for bch_data_insert (bsc#1130972).
- bcache: update comment in sysfs.c (bsc#1130972).
- bcache: update comment in sysfs.c (bsc#1130972).
- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).
- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).
- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).
- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).
- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).
- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).
- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).
- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).
- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- blk-mq: Avoid that submitting a bio concurrently with device removal triggers a crash (bsc#1131673).
- blk-mq: adjust debugfs and sysfs register when updating nr_hw_queues (bsc#1131673).
- blk-mq: change gfp flags to GFP_NOIO in blk_mq_realloc_hw_ctxs (bsc#1131673).
- blk-mq: fallback to previous nr_hw_queues when updating fails (bsc#1131673).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- blk-mq: init hctx sched after update ctx and hctx mapping (bsc#1131673).
- blk-mq: realloc hctx when hw queue is mapped to another node (bsc#1131673).
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter (bsc#1131673).
- blkcg: Introduce blkg_root_lookup() (bsc#1131673).
- blkcg: Make blkg_root_lookup() work for queues in bypass mode (bsc#1131673).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).
- block: Ensure that a request queue is dissociated from the cgroup controller (bsc#1131673).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- block: Fix a race between request queue removal and the block cgroup controller (bsc#1131673).
- block: Introduce blk_exit_queue() (bsc#1131673).
- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).
- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).
- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).
- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).
- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).
- block: fix the return errno for direct IO (bsc#1135320).
- block: fix use-after-free on gendisk (bsc#1135312).
- block: kABI fixes for bio_rewind_iter() removal (bsc#1131673).
- block: remove bio_rewind_iter() (bsc#1131673).
- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).
- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf() (bsc#1133731).
- bnx2x: Add support for detection of P2P event packets (bsc#1136498 jsc#SLE-4699).
- bnx2x: Bump up driver version to 1.713.36 (bsc#1136498 jsc#SLE-4699).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnx2x: Remove set but not used variable 'mfw_vn' (bsc#1136498 jsc#SLE-4699).
- bnx2x: Replace magic numbers with macro definitions (bsc#1136498 jsc#SLE-4699).
- bnx2x: Use struct_size() in kzalloc() (bsc#1136498 jsc#SLE-4699).
- bnx2x: Utilize FW 7.13.11.0 (bsc#1136498 jsc#SLE-4699).
- bnx2x: fix spelling mistake 'dicline' 'decline' (bsc#1136498 jsc#SLE-4699).
- bnx2x: fix various indentation issues (bsc#1136498 jsc#SLE-4699).
- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).
- bnxt_en: Add support for BCM957504 (bsc#1137224).
- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745 FATE#325918).
- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745 FATE#325918).
- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242 FATE#322914).
- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745 FATE#325918).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).
- bpf, devmap: Add missing bulk queue free (bsc#1109837).
- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).
- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).
- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bpf: Add missed newline in verifier verbose log (bsc#1056787).
- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).
- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).
- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).
- bpf: fix callees pruning callers (bsc#1109837).
- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).
- bpf: fix use after free in bpf_evict_inode (bsc#1083647).
- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).
- bpf: sockmap fix msg sg.size account on ingress skb (bsc#1109837).
- bpf: sockmap remove duplicate queue free (bsc#1109837).
- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).
- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).
- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).
- brcmfmac: fix NULL pointer derefence during USB disconnect (bsc#1111666).
- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).
- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).
- brcmfmac: fix leak of mypkt on error return path (bsc#1111666).
- brcmfmac: fix missing checks for kmemdup (bsc#1051510).
- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).
- broadcom: Mark expected switch fall-throughs (bsc#1136498 jsc#SLE-4699).
- btrfs: Do not panic when we can't find a root key (bsc#1112063).
- btrfs: Factor out common delayed refs init code (bsc#1134813).
- btrfs: Introduce init_delayed_ref_head (bsc#1134813).
- btrfs: Open-code add_delayed_data_ref (bsc#1134813).
- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).
- btrfs: add a helper to return a head ref (bsc#1134813).
- btrfs: breakout empty head cleanup to a helper (bsc#1134813).
- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).
- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: fix assertion failure on fsync with NO_HOLES enabled (bsc#1131848).
- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).
- btrfs: fix incorrect file size after shrinking truncate and fsync (bsc#1130195).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).
- btrfs: fix race updating log root item during fsync (bsc#1137153).
- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).
- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).
- btrfs: move all ref head cleanup to the helper function (bsc#1134813).
- btrfs: move extent_op cleanup to a helper (bsc#1134813).
- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).
- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).
- btrfs: remove WARN_ON in log_dir_items (bsc#1131847).
- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).
- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).
- btrfs: split delayed ref head initialization and addition (bsc#1134813).
- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).
- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- carl9170: fix misuse of device driver API (bsc#1111666).
- cdrom: Fix race condition in cdrom_sysctl_register (bsc#1051510).
- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).
- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).
- ceph: factor out ceph_lookup_inode() (bsc#1138681).
- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).
- ceph: fix ci i_head_snapc leak (bsc#1122776).
- ceph: fix ci i_head_snapc leak (bsc#1122776).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: fix use-after-free on symlink traversal (bsc#1134459).
- ceph: fix use-after-free on symlink traversal (bsc#1134459).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- ceph: only use d_name directly when parent is locked (bsc#1134460).
- ceph: only use d_name directly when parent is locked (bsc#1134460).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- ceph: quota: fix quota subdir mounts (bsc#1138681).
- ceph: remove duplicated filelock ref increase (bsc#1138681).
- cfg80211: Handle WMM rules in regulatory domain intersection (bsc#1111666).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- cgroup: fix parsing empty mount option string (bsc#1133094).
- chardev: add additional check for minor range overlap (bsc#1051510).
- chelsio: use BUG() instead of BUG_ON(1) (bsc#1136345 jsc#SLE-4681).
- cifs: Fix potential OOB access of lock element array (bsc#1051510).
- cifs: don't dereference smb_file_target before null check (bsc#1051510).
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- clk: fractional-divider: check parent rate only if flag is set (bsc#1051510).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Don't yell about bad mmc phases when getting (bsc#1051510).
- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: rockchip: fix frac settings of GPLL clock for rk3328 (bsc#1051510).
- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- clk: x86: Add system specific quirk to mark clocks as critical (bsc#1051510).
- config: arm64: enable CN99xx uncore pmu References: bsc#1117114
- configfs: Fix use-after-free when accessing sd s_dentry (bsc#1051510).
- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU doesn't support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: arm/aes-neonbs - don't access already-freed walk.iv (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: caam - add missing put_device() call (bsc#1129770).
- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).
- crypto: caam/qi2 - fix DMA mapping of stack memory (bsc#1111666).
- crypto: caam/qi2 - fix zero-length buffer DMA mapping (bsc#1111666).
- crypto: caam/qi2 - generate hash keys in-place (bsc#1111666).
- crypto: ccm - fix incompatibility between 'ccm' and 'ccm_base' (bsc#1051510).
- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).
- crypto: chcr - ESN for Inline IPSec Tx (bsc#1136353 jsc#SLE-4688).
- crypto: chcr - small packet Tx stalls the queue (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fix NULL pointer dereference (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fix passing zero to 'PTR_ERR' warning in chcr_aead_op (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fix softlockup with heavy I/O (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fix wrong error counter increments (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fixed Traffic Stall (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Handle pci shutdown event (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Inline single pdu only (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Reset counters on cxgb4 Detach (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Swap location of AAD and IV sent in WR (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Use same value for both channel in single WR (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - avoid using sa_entry imm (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - check set_msg_len overflow in generate_b0 (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - clean up various indentation issues (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - cleanup:send addr as value in function argument (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - count incomplete block in IV (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - remove set but not used variable 'kctx_len' (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - remove set but not used variables 'adap' (bsc#1136353 jsc#SLE-4688).
- crypto: chtls - remove cdev_list_lock (bsc#1136353 jsc#SLE-4688).
- crypto: chtls - remove set but not used variables 'err, adap, request, hws' (bsc#1136353 jsc#SLE-4688).
- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: crypto4xx - properly set IV after de- and encrypt (bsc#1051510).
- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).
- crypto: gcm - fix incompatibility between 'gcm' and 'gcm_base' (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: pcbc - remove bogus memcpy()s with src == dest (bsc#1051510).
- crypto: prefix header search paths with $(srctree)/ (bsc#1136353 jsc#SLE-4688).
- crypto: sha256/arm - fix crash bug in Thumb2 build (bsc#1051510).
- crypto: sha512/arm - fix crash bug in Thumb2 build (bsc#1051510).
- crypto: skcipher - don't WARN on unprocessed data after slow walk step (bsc#1051510).
- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).
- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).
- crypto: x86/poly1305 - fix overflow during partial reduction (bsc#1051510).
- cxgb4/chtls: Prefix adapter flags with CXGB4 (bsc#1136345 jsc#SLE-4681).
- cxgb4/cxgb4vf: Add support for SGE doorbell queue timer (bsc#1127371).
- cxgb4/cxgb4vf: Display advertised FEC in ethtool (bsc#1136345 jsc#SLE-4681).
- cxgb4/cxgb4vf: Fix mac_hlist initialization and free (bsc#1127374).
- cxgb4/cxgb4vf: Fix up netdev hw_features (bsc#1136345 jsc#SLE-4681).
- cxgb4/cxgb4vf: Link management changes (bsc#1127371).
- cxgb4/cxgb4vf: Program hash region for {t4/t4vf}_change_mac() (bsc#1127371).
- cxgb4/cxgb4vf_main: Mark expected switch fall-through (bsc#1136345 jsc#SLE-4681).
- cxgb4: Add VF Link state support (bsc#1136345 jsc#SLE-4681).
- cxgb4: Add capability to get/set SGE Doorbell Queue Timer Tick (bsc#1127371).
- cxgb4: Add flag tc_flower_initialized (bsc#1127371).
- cxgb4: Add new T5 pci device id 0x50ae (bsc#1127371).
- cxgb4: Add new T5 pci device ids 0x50af and 0x50b0 (bsc#1127371).
- cxgb4: Add new T6 pci device ids 0x608a (bsc#1127371).
- cxgb4: Add new T6 pci device ids 0x608b (bsc#1136345 jsc#SLE-4681).
- cxgb4: Add support for FW_ETH_TX_PKT_VM_WR (bsc#1127371).
- cxgb4: Add support to read actual provisioned resources (bsc#1127371).
- cxgb4: Added missing break in ndo_udp_tunnel_{add/del} (bsc#1127371).
- cxgb4: Delete all hash and TCAM filters before resource cleanup (bsc#1136345 jsc#SLE-4681).
- cxgb4: Do not return EAGAIN when TCAM is full (bsc#1136345 jsc#SLE-4681).
- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).
- cxgb4: Enable outer UDP checksum offload for T6 (bsc#1136345 jsc#SLE-4681).
- cxgb4: Export sge_host_page_size to ulds (bsc#1127371).
- cxgb4: Fix error path in cxgb4_init_module (bsc#1136345 jsc#SLE-4681).
- cxgb4: Mask out interrupts that are not enabled (bsc#1127175).
- cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size (bsc#1127371).
- cxgb4: Revert 'cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size' (bsc#1136345 jsc#SLE-4681).
- cxgb4: Support ethtool private flags (bsc#1127371).
- cxgb4: TLS record offload enable (bsc#1136345 jsc#SLE-4681).
- cxgb4: Update 1.23.3.0 as the latest firmware supported (bsc#1136345 jsc#SLE-4681).
- cxgb4: add per rx-queue counter for packet errors (bsc#1127371).
- cxgb4: add support to display DCB info (bsc#1127371).
- cxgb4: add tcb flags and tcb rpl struct (bsc#1136345 jsc#SLE-4681).
- cxgb4: collect ASIC LA dumps from ULP TX (bsc#1127371).
- cxgb4: collect hardware queue descriptors (bsc#1127371).
- cxgb4: collect number of free PSTRUCT page pointers (bsc#1127371).
- cxgb4: convert flower table to use rhashtable (bsc#1127371).
- cxgb4: cxgb4: use FW_PORT_ACTION_L1_CFG32 for 32 bit capability (bsc#1127371).
- cxgb4: display number of rx and tx pages free (bsc#1127371).
- cxgb4: do not return DUPLEX_UNKNOWN when link is down (bsc#1127371).
- cxgb4: fix the error path of cxgb4_uld_register() (bsc#1127371).
- cxgb4: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).
- cxgb4: impose mandatory VLAN usage when non-zero TAG ID (bsc#1127371).
- cxgb4: kfree mhp after the debug print (bsc#1136345 jsc#SLE-4681).
- cxgb4: move Tx/Rx free pages collection to common code (bsc#1127371).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1136345 jsc#SLE-4681).
- cxgb4: remove DEFINE_SIMPLE_DEBUGFS_FILE() (bsc#1136345 jsc#SLE-4681).
- cxgb4: remove redundant assignment to vlan_cmd.dropnovlan_fm (bsc#1127371).
- cxgb4: remove set but not used variables 'multitrc, speed' (bsc#1136345 jsc#SLE-4681).
- cxgb4: remove the unneeded locks (bsc#1127371).
- cxgb4: specify IQTYPE in fw_iq_cmd (bsc#1127371).
- cxgb4: update supported DCB version (bsc#1127371).
- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).
- cxgb4: use new fw interface to get the VIN and smt index (bsc#1127371).
- cxgb4vf: Call netif_carrier_off properly in pci_probe (bsc#1136347 jsc#SLE-4683).
- cxgb4vf: Enter debugging mode if FW is inaccessible (bsc#1136347 jsc#SLE-4683).
- cxgb4vf: Few more link management changes (bsc#1127374).
- cxgb4vf: Prefix adapter flags with CXGB4VF (bsc#1136347 jsc#SLE-4683).
- cxgb4vf: Revert force link up behaviour (bsc#1136347 jsc#SLE-4683).
- cxgb4vf: Update port information in cxgb4vf_open() (bsc#1127374).
- cxgb4vf: fix memleak in mac_hlist initialization (bsc#1127374).
- cxgb4vf: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- dccp: Fix memleak in __feat_register_sp (bsc#1051510).
- debugfs: fix use-after-free on symlink traversal (bsc#1051510).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- device_cgroup: fix RCU imbalance in error case (bsc#1051510).
- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).
- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).
- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).
- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).
- dmaengine: axi-dmac: Don't check the number of frames for alignment (bsc#1051510).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bsc#1051510).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).
- dmaengine: qcom_hidma: assign channel cookie correctly (bsc#1051510).
- dmaengine: sh: rcar-dmac: With cyclic DMA residue 0 is valid (bsc#1051510).
- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).
- dmaengine: tegra210-adma: restore channel status (bsc#1111666).
- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).
- dmaengine: tegra: avoid overflow of byte tracking (bsc#1051510).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base/devres: introduce devm_release_action() (bsc#1103992 FATE#326009).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).
- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).
- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).
- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: thermal: tsens: Don't print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).
- drm/amd/display: If one stream full updates, full update all planes (bsc#1111666).
- drm/amd/display: Make some functions static (bsc#1111666).
- drm/amd/display: Set stream mode_changed when connectors change (bsc#1111666).
- drm/amd/display: Use plane color_space for dpp if specified (bsc#1111666).
- drm/amd/display: extending AUX SW Timeout (bsc#1111666).
- drm/amd/display: fix cursor black issue (bsc#1111666).
- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).
- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/amdgpu/gmc9: fix VM_L2_CNTL3 programming (bsc#1111666).
- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).
- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).
- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).
- drm/amdkfd: use init_mqd function to allocate object for hid_mqd (CI) (bsc#1111666).
- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).
- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).
- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).
- drm/doc: Drop 'content type' from the legacy kms property table (bsc#1111666).
- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bsc#1051510).
- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).
- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).
- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).
- drm/etnaviv: lock MMU while dumping core (bsc#1113722)
- drm/exynos/mixer: fix MIXER shadow registry synchronisation code (bsc#1111666).
- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).
- drm/fb-helper: generic: Call drm_client_add() after setup is done (bsc#1111666).
- drm/fb-helper: generic: Don't take module ref for fbcon (bsc#1111666).
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).
- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113722)
- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113956)
- drm/i915/gvt: Annotate iomem usage (bsc#1051510).
- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)
- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)
- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).
- drm/i915/gvt: Prevent use-after-free in ppgtt_free_all_spt() (bsc#1111666).
- drm/i915/gvt: Roundup fb height into tile's height at calucation fb size (bsc#1111666).
- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)
- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)
- drm/i915/gvt: do not deliver a workload if its creation fails (bsc#1051510).
- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).
- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113722)
- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113956)
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/gvt: refine ggtt range validation (bsc#1113722)
- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).
- drm/i915/icl: Whitelist GEN9_SLICE_COMMON_ECO_CHICKEN1 (bsc#1111666).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).
- drm/i915: Disable tv output on i9x5gm (bsc#1086657, bsc#1133897).
- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).
- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).
- drm/i915: Force 2*96 MHz cdclk on glk/cnl when audio power is enabled (bsc#1111666).
- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).
- drm/imx: don't skip DP channel disable for background plane (bsc#1051510).
- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).
- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).
- drm/lease: Make sure implicit planes are leased (bsc#1111666).
- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113722)
- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113956)
- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).
- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).
- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).
- drm/mediatek: fix possible object reference leak (bsc#1051510).
- drm/mediatek: fix unbind functions (bsc#1111666).
- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).
- drm/meson: Add support for XBGR8888 ABGR8888 formats (bsc#1051510).
- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).
- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).
- drm/msm: fix fb references in async update (bsc#1111666).
- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).
- drm/nouveau/bar/tu104: initial support (bsc#1133593).
- drm/nouveau/bar/tu106: initial support (bsc#1133593).
- drm/nouveau/bios/tu104: initial support (bsc#1133593).
- drm/nouveau/bios/tu106: initial support (bsc#1133593).
- drm/nouveau/bios: translate additional memory types (bsc#1133593).
- drm/nouveau/bios: translate usb-C connector type (bsc#1133593).
- drm/nouveau/bus/tu104: initial support (bsc#1133593).
- drm/nouveau/bus/tu106: initial support (bsc#1133593).
- drm/nouveau/ce/tu104: initial support (bsc#1133593).
- drm/nouveau/ce/tu106: initial support (bsc#1133593).
- drm/nouveau/core: increase maximum number of nvdec instances to 3 (bsc#1133593).
- drm/nouveau/core: recognise TU102 (bsc#1133593).
- drm/nouveau/core: recognise TU104 (bsc#1133593).
- drm/nouveau/core: recognise TU106 (bsc#1133593).
- drm/nouveau/core: support multiple nvdec instances (bsc#1133593).
- drm/nouveau/devinit/gm200-: export function to upload+execute PMU/PRE_OS (bsc#1133593).
- drm/nouveau/devinit/tu104: initial support (bsc#1133593).
- drm/nouveau/devinit/tu106: initial support (bsc#1133593).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/nouveau/disp/gm200-: add scdc parameter setter (bsc#1133593).
- drm/nouveau/disp/gv100: fix name of window channels in debug output (bsc#1133593).
- drm/nouveau/disp/tu104: initial support (bsc#1133593).
- drm/nouveau/disp/tu106: initial support (bsc#1133593).
- drm/nouveau/disp: add a way to configure scrambling/tmds for hdmi 2.0 (bsc#1133593).
- drm/nouveau/disp: add support for setting scdc parameters for high modes (bsc#1133593).
- drm/nouveau/disp: keep track of high-speed state, program into clock (bsc#1133593).
- drm/nouveau/disp: take sink support into account for exposing 594mhz (bsc#1133593).
- drm/nouveau/dma/tu104: initial support (bsc#1133593).
- drm/nouveau/dma/tu106: initial support (bsc#1133593).
- drm/nouveau/drm/nouveau: Do not forget to label dp_aux devices (bsc#1133593).
- drm/nouveau/drm/nouveau: s/nouveau_backlight_exit/nouveau_backlight_fini/ (bsc#1133593).
- drm/nouveau/drm/nouveau: tegra: Call nouveau_drm_device_init() (bsc#1133593).
- drm/nouveau/fault/tu104: initial support (bsc#1133593).
- drm/nouveau/fault/tu106: initial support (bsc#1133593).
- drm/nouveau/fault: add explicit control over fault buffer interrupts (bsc#1133593).
- drm/nouveau/fault: remove manual mapping of fault buffers into BAR2 (bsc#1133593).
- drm/nouveau/fault: store get/put pri address in nvkm_fault_buffer (bsc#1133593).
- drm/nouveau/fb/tu104: initial support (bsc#1133593).
- drm/nouveau/fb/tu106: initial support (bsc#1133593).
- drm/nouveau/fifo/gf100-: call into BAR to reset BARs after MMU fault (bsc#1133593).
- drm/nouveau/fifo/gk104-: group pbdma functions together (bsc#1133593).
- drm/nouveau/fifo/gk104-: return channel instance in ctor args (bsc#1133593).
- drm/nouveau/fifo/gk104-: separate runlist building from committing to hw (bsc#1133593).
- drm/nouveau/fifo/gk104-: support enabling privileged ce functions (bsc#1133593).
- drm/nouveau/fifo/gk104-: virtualise pbdma enable function (bsc#1133593).
- drm/nouveau/fifo/gm200-: read pbdma count more directly (bsc#1133593).
- drm/nouveau/fifo/gv100: allocate method buffer (bsc#1133593).
- drm/nouveau/fifo/gv100: return work submission token in channel ctor args (bsc#1133593).
- drm/nouveau/fifo/tu104: initial support (bsc#1133593).
- drm/nouveau/fifo/tu106: initial support (bsc#1133593).
- drm/nouveau/fuse/tu104: initial support (bsc#1133593).
- drm/nouveau/fuse/tu106: initial support (bsc#1133593).
- drm/nouveau/gpio/tu104: initial support (bsc#1133593).
- drm/nouveau/gpio/tu106: initial support (bsc#1133593).
- drm/nouveau/i2c/tu104: initial support (bsc#1133593).
- drm/nouveau/i2c/tu106: initial support (bsc#1133593).
- drm/nouveau/i2c: Disable i2c bus access after fini() (bsc#1113722)
- drm/nouveau/i2c: Enable i2c pads busses during preinit (bsc#1051510).
- drm/nouveau/ibus/tu104: initial support (bsc#1133593).
- drm/nouveau/ibus/tu106: initial support (bsc#1133593).
- drm/nouveau/imem/nv50: support pinning objects in BAR2 and returning address (bsc#1133593).
- drm/nouveau/imem/tu104: initial support (bsc#1133593).
- drm/nouveau/imem/tu106: initial support (bsc#1133593).
- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).
- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).
- drm/nouveau/kms/nv50-: allow more flexibility with lut formats (bsc#1133593).
- drm/nouveau/kms/tu104: initial support (bsc#1133593).
- drm/nouveau/ltc/tu104: initial support (bsc#1133593).
- drm/nouveau/ltc/tu106: initial support (bsc#1133593).
- drm/nouveau/mc/tu104: initial support (bsc#1133593).
- drm/nouveau/mc/tu106: initial support (bsc#1133593).
- drm/nouveau/mmu/tu104: initial support (bsc#1133593).
- drm/nouveau/mmu/tu106: initial support (bsc#1133593).
- drm/nouveau/mmu: add more general vmm free/node handling functions (bsc#1133593).
- drm/nouveau/pci/tu104: initial support (bsc#1133593).
- drm/nouveau/pci/tu106: initial support (bsc#1133593).
- drm/nouveau/pmu/tu104: initial support (bsc#1133593).
- drm/nouveau/pmu/tu106: initial support (bsc#1133593).
- drm/nouveau/therm/tu104: initial support (bsc#1133593).
- drm/nouveau/therm/tu106: initial support (bsc#1133593).
- drm/nouveau/tmr/tu104: initial support (bsc#1133593).
- drm/nouveau/tmr/tu106: initial support (bsc#1133593).
- drm/nouveau/top/tu104: initial support (bsc#1133593).
- drm/nouveau/top/tu106: initial support (bsc#1133593).
- drm/nouveau/volt/gf117: fix speedo readout register (bsc#1051510).
- drm/nouveau: Add NV_PRINTK_ONCE and variants (bsc#1133593).
- drm/nouveau: Add size to vbios.rom file in debugfs (bsc#1133593).
- drm/nouveau: Add strap_peek to debugfs (bsc#1133593).
- drm/nouveau: Cleanup indenting in nouveau_backlight.c (bsc#1133593).
- drm/nouveau: Fix potential memory leak in nouveau_drm_load() (bsc#1133593).
- drm/nouveau: Move backlight device into nouveau_connector (bsc#1133593).
- drm/nouveau: Refactor nvXX_backlight_init() (bsc#1133593).
- drm/nouveau: Remove unecessary dma_fence_ops (bsc#1133593).
- drm/nouveau: Start using new drm_dev initialization helpers (bsc#1133593).
- drm/nouveau: Stop using drm_crtc_force_disable (bsc#1051510).
- drm/nouveau: add DisplayPort CEC-Tunneling-over-AUX support (bsc#1133593).
- drm/nouveau: register backlight on pascal and newer (bsc#1133593).
- drm/nouveau: remove left-over struct member (bsc#1133593).
- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).
- drm/omap: hdmi4_cec: Fix CEC clock handling for PM (bsc#1111666).
- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).
- drm/panel: panel-innolux: set display off in innolux_panel_unprepare (bsc#1111666).
- drm/pl111: Initialize clock spinlock early (bsc#1111666).
- drm/pl111: fix possible object reference leak (bsc#1111666).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/rockchip: fix for mailbox read validation (bsc#1051510).
- drm/rockchip: fix for mailbox read validation (bsc#1111666).
- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).
- drm/rockchip: vop: reset scale mode when win is disabled (bsc#1113722)
- drm/sun4i: Add missing drm_atomic_helper_shutdown at driver unbind (bsc#1113722)
- drm/sun4i: Fix component unbinding and component master deletion (bsc#1113722)
- drm/sun4i: Fix sun8i HDMI PHY clock initialization (bsc#1111666).
- drm/sun4i: Fix sun8i HDMI PHY configuration for 148.5 MHz (bsc#1111666).
- drm/sun4i: Set device driver data at bind time for use in unbind (bsc#1113722)
- drm/sun4i: Unbind components before releasing DRM and memory (bsc#1113722)
- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).
- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).
- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)
- drm/sun4i: tcon top: Fix NULL/invalid pointer dereference in sun8i_tcon_top_un/bind (bsc#1111666).
- drm/tegra: gem: Fix CPU-cache maintenance for BO's allocated using get_pages() (bsc#1111666).
- drm/tegra: hub: Fix dereference before check (bsc#1111666).
- drm/ttm: Fix bo_global and mem_global kfree error (bsc#1111666).
- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)
- drm/ttm: fix out-of-bounds read in ttm_put_pages() v2 (bsc#1111666).
- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).
- drm/udl: add a release method and delay modeset teardown (bsc#1085536)
- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).
- drm/udl: move to embedding drm device inside udl device (bsc#1111666).
- drm/v3d: Handle errors from IRQ setup (bsc#1111666).
- drm/vc4: Fix memory leak during gpu reset. (bsc#1113722)
- drm/vc4: fix fb references in async update (bsc#1141312).
- drm/vmwgfx: Don't send drm sysfs hotplug events on initial master set (bsc#1051510).
- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).
- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)
- drm/vmwgfx: Remove set but not used variable 'restart' (bsc#1111666).
- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).
- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).
- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).
- drm: Auto-set allow_fb_modifiers when given modifiers at plane init (bsc#1051510).
- drm: Fix drm_release() and device unplug (bsc#1111666).
- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).
- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).
- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).
- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).
- drm: bridge: dw-hdmi: Fix overflow workaround for Rockchip SoCs (bsc#1113722)
- drm: don't block fb changes for async plane updates (bsc#1111666).
- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).
- drm: rcar-du: Fix rcar_du_crtc structure documentation (bsc#1111666).
- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).
- drm_dp_cec: add note about good MegaChips 2900 CEC support (bsc#1136978).
- drm_dp_cec: check that aux has a transfer function (bsc#1136978).
- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).
- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).
- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).
- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).
- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).
- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).
- e1000e: Fix -Wformat-truncation warnings (bsc#1051510).
- e1000e: fix cyclic resets at link up with active tx (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).
- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: Revert 'Defer persistent reservations until after paging_init()' (bsc#1117158).
- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).
- efi/arm: libstub: add a root memreserve config table (bsc#1117158).
- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).
- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).
- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).
- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).
- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).
- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).
- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).
- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).
- ext4: Do not warn when enabling DAX (bsc#1132894).
- ext4: actually request zeroing of inode table after grow (bsc#1135315).
- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).
- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).
- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).
- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).
- ext4: make sanity check in mballoc more strict (bsc#1136439).
- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).
- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).
- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).
- fbdev: fbmem: fix memory access if logo is bigger than the screen (bsc#1051510).
- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)
- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)
- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).
- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).
- fix cgroup_do_mount() handling of failure exits (bsc#1133095).
- fm10k: Fix a potential NULL pointer dereference (bsc#1051510).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).
- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).
- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).
- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).
- fs: hugetlbfs: fix hwpoison reserve accounting (bsc#1139712)
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- fuse: fallocate: fix return with locked inode (bsc#1051510).
- fuse: fix writepages on 32bit (bsc#1051510).
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).
- futex: Cure exit race (bsc#1050549).
- futex: Ensure that futex address is aligned in handle_futex_death() (bsc#1050549).
- futex: Handle early deadlock return correctly (bsc#1050549).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).
- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).
- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bsc#1051510).
- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).
- gpio: fix gpio-adp5588 build errors (bsc#1051510).
- gpio: gpio-omap: fix level interrupt idling (bsc#1051510).
- gpio: of: Fix of_gpiochip_add() error path (bsc#1051510).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).
- hid: i2c-hid: Ignore input report if there's no data present on Elan touchpanels (bsc#1133486).
- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- hwmon: (core) add thermal sensors only if dev of_node is present (bsc#1051510).
- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).
- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwrng: omap - Set default quality (bsc#1051510).
- hwrng: virtio - Avoid repeated init of completion (bsc#1051510).
- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).
- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).
- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).
- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).
- i2c: imx: correct the method of getting private data in notifier_call (bsc#1111666).
- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).
- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).
- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).
- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).
- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).
- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).
- i2c: synquacer: fix enumeration of slave devices (bsc#1111666).
- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).
- ib/hw: Remove unneeded semicolons (bsc#1136456 jsc#SLE-4689).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Enable GRO (bsc#1132227).
- ibmvnic: Fix completion structure initialization (bsc#1131659).
- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).
- iio/gyro/bmg160: Use millidegrees for temperature scale (bsc#1051510).
- iio: Fix scan mask selection (bsc#1051510).
- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).
- iio: ad_sigma_delta: select channel when reading register (bsc#1051510).
- iio: adc: at91: disable adc channel interrupt in timeout case (bsc#1051510).
- iio: adc: fix warning in Qualcomm PM8xxx HK/XOADC driver (bsc#1051510).
- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).
- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).
- iio: core: fix a possible circular locking dependency (bsc#1051510).
- iio: cros_ec: Fix the maths for gyro scale calculation (bsc#1051510).
- iio: dac: mcp4725: add missing powerdown bits in store eeprom (bsc#1051510).
- iio: gyro: mpu3050: fix chip ID reading (bsc#1051510).
- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).
- include/linux/bitops.h: introduce BITS_PER_TYPE (bsc#1136345 jsc#SLE-4681).
- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).
- infiniband/qedr: Potential null ptr dereference of qp (bsc#1136456 jsc#SLE-4689).
- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- intel_th: pci: Add Comet Lake support (bsc#1051510).
- io: accel: kxcjk1013: restore the range after resume (bsc#1051510).
- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/amd: Set exclusion range correctly (bsc#1130425).
- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).
- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).
- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).
- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).
- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).
- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).
- ipmi: Prevent use-after-free in deliver_response (bsc#1111666).
- ipmi: fix sleep-in-atomic in free_user at cleanup SRCU user release_barrier (bsc#1111666).
- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).
- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).
- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).
- ipvlan: Add the skb mark as flow4's member to lookup route (bsc#1051510).
- ipvlan: fix ipv6 outbound device (bsc#1051510).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).
- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).
- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Don't clear eventid when freeing an MSI (bsc#1051510).
- iw_cxgb*: kzalloc the iwcm verbs struct (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: Check for send WR also while posting write with completion WR (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: Make function read_tcb() static (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: complete the cached SRQ buffers (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: cq/qp mask depends on bar2 pages in a host page (bsc#1127371).
- iw_cxgb4: fix srqidx leak during connection abort (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).
- iw_cxgb4: use listening ep tos when accepting new connections (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: use tos when finding ipv6 routes (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: use tos when importing the endpoint (bsc#1136348 jsc#SLE-4684).
- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).
- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).
- iwlwifi: correct one of the PCI struct names (bsc#1111666).
- iwlwifi: don't WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).
- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).
- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).
- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).
- iwlwifi: fix driver operation for 5350 (bsc#1111666).
- iwlwifi: fix send hcmd timeout recovery flow (bsc#1129770).
- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).
- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).
- iwlwifi: pcie: don't crash on invalid RX interrupt (bsc#1051510).
- iwlwifi: pcie: don't service an interrupt that was masked (bsc#1111666).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).
- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).
- jbd2: check superblock mapped prior to committing (bsc#1136430).
- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).
- kABI workaround for asus-wmi changes (bsc#1051510).
- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).
- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kABI: protect functions using struct net_generic (bsc#1129845 LTC#176252).
- kABI: protect struct smc_ib_device (bsc#1129845 LTC#176252).
- kABI: protect struct smcd_dev (bsc#1129845 LTC#176252).
- kabi fixup blk_mq_register_dev() (bsc#1140637).
- kabi protect struct iw_cm_id (bsc#1136348 jsc#SLE-4684).
- kabi protect struct vf_info (bsc#1136347 jsc#SLE-4683).
- kabi/severities: exclude hns3 symbols (bsc#1134948)
- kabi/severities: exclude qed* symbols (bsc#1136461)
- kabi/severities: exclude qed* symbols (bsc#1136461)
- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).
- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).
- kabi: s390: enum interruption_class (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).
- kbuild: strip whitespace in cmd_record_mcount findstring (bsc#1065729).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).
- kcm: switch order of device registration to fix a crash (bnc#1130527).
- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).
- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).
- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).
- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kernfs: do not set dentry d_fsdata (boo#1133115).
- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).
- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).
- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).
- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).
- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128904 LTC#176078).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132563).
- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).
- kvm: Fix kABI for AMD SMAP Errata workaround (bsc#1133149).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- kvm: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation) (bsc#1133149).
- kvm: VMX: Compare only a single byte for VMCS' 'launched' in vCPU-run (bsc#1132555).
- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132561).
- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).
- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bsc#1132564).
- kvm: nVMX: Sign extend displacements of VMX instr's mem operands (bsc#1132562).
- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222
- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: s390: use created_vcpus in more places (bsc#1136206).
- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- kvm: x86/mmu: Detect MMIO generation wrap in any address space (bsc#1132570).
- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132571).
- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).
- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- kvm: x86: Report STibP on GET_SUPPORTED_CPUID (bsc#1111331).
- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- kvm: x86: fix return value for reserved EFER (bsc#1140992).
- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).
- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).
- l2tp: revert 'l2tp: fix missing print session offset info' (bsc#1051510).
- leds: avoid flush_work in atomic context (bsc#1051510).
- leds: avoid races with workqueue (bsc#1051510).
- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib/scatterlist: Fix mapping iterator when sg offset is greater than PAGE_SIZE (bsc#1051510).
- lib: add crc64 calculation routines (bsc#1130972).
- lib: add crc64 calculation routines (bsc#1130972).
- lib: do not depend on linux headers being installed (bsc#1130972).
- lib: do not depend on linux headers being installed (bsc#1130972).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libata: fix using DMA buffers on stack (bsc#1051510).
- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).
- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897). This feature was requested for SLE15 but aws reverted in packaging and master.
- libceph: assign cookies in linger_submit() (bsc#1135897).
- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).
- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).
- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).
- libceph: introduce alloc_watch_request() (bsc#1135897).
- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).
- libceph: preallocate message data items (bsc#1135897).
- libcxgb: fix incorrect ppmax calculation (bsc#1136345 jsc#SLE-4681).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).
- lightnvm: if LUNs are already allocated fix return (bsc#1085535).
- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).
- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).
- livepatch: Remove custom kobject state handling (bsc#1071995).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).
- livepatch: Remove duplicated code for early initialization (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).
- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).
- mISDN: Check address length before reading address family (bsc#1051510).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).
- mac80211: Honor SW_CRYPTO_CONTROL for unicast keys in AP VLAN mode (bsc#1111666).
- mac80211: do not call driver wake_tx_queue op during reconfig (bsc#1051510).
- mac80211: do not start any work during reconfigure flow (bsc#1111666).
- mac80211: don't attempt to rename ERR_PTR() debugfs dirs (bsc#1111666).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).
- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).
- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).
- mac80211: free peer keys before vif down in mesh (bsc#1111666).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- mac80211: mesh: fix RCU warning (bsc#1111666).
- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).
- mac8390: Fix mmio access size probe (bsc#1051510).
- md: batch flush requests (bsc#1119680).
- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).
- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).
- media: au0828: stop video streaming only when last user stops (bsc#1051510).
- media: coda: clear error return value before picture run (bsc#1051510).
- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).
- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).
- media: cx23885: check allocation return (bsc#1051510).
- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).
- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).
- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).
- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).
- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: mt9m111: set initial frame size other than 0x0 (bsc#1051510).
- media: mtk-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).
- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).
- media: ov2659: make S_FMT succeed even if requested format doesn't match (bsc#1051510).
- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).
- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: saa7146: avoid high stack usage with clang (bsc#1051510).
- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).
- media: sh_veu: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: smsusb: better handle optional alignment (bsc#1051510).
- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).
- media: usb: siano: Fix false-positive 'uninitialized variable' warning (bsc#1051510).
- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- media: v4l2: Test type instead of cfg type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- media: vivid: use vfree() instead of kfree() for dev bitmap_cap (bsc#1051510).
- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).
- media: wl128x: prevent two potential buffer overflows (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memcg: make it work on sparse non-0-node systems (bnc#1133616).
- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).
- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).
- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).
- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).
- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).
- mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).
- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).
- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).
- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).
- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).
- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm/debug.c: fix __dump_page when mapping host is not set (bsc#1131934).
- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992 FATE#326009).
- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935).
- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bsc#1133825).
- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)
- mm: fix race on soft-offlining free huge pages (bsc#1139712).
- mm: hugetlb: delete dequeue_hwpoisoned_huge_page() (bsc#1139712).
- mm: hugetlb: prevent reuse of hwpoisoned free hugepages (bsc#1139712).
- mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (bsc#1139712).
- mm: hugetlb: soft-offline: dissolve_free_huge_page() return zero on !PageHuge (bsc#bsc#1139712).
- mm: hugetlb: soft_offline: save compound page order before page migration (bsc#1139712)
- mm: hwpoison: change PageHWPoison behavior on hugetlb pages (bsc#1139712).
- mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (bsc#1139712).
- mm: hwpoison: introduce idenfity_page_state (bsc#1139712).
- mm: hwpoison: introduce memory_failure_hugetlb() (bsc#1139712).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mm: soft-offline: close the race against page allocation (bsc#1139712).
- mm: soft-offline: dissolve free hugepage if soft-offlined (bsc#1139712).
- mm: soft-offline: return -EBUSY if set_hwpoison_free_buddy_page() fails (bsc#1139712).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- mmc: bcm2835 MMC issues (bsc#1070872).
- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).
- mmc: core: Fix tag set memory leak (bsc#1111666).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: Verify SD bus width (bsc#1051510).
- mmc: core: complete HS400 before checking status (bsc#1111666).
- mmc: core: fix possible use after free of host (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: davinci: remove extraneous __init annotation (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mmc: sdhci: Fix data command CRC error handling (bsc#1051510).
- mmc: sdhci: Handle auto-command errors (bsc#1051510).
- mmc: sdhci: Rename SDHCI_ACMD12_ERR and SDHCI_INT_ACMD12ERR (bsc#1051510).
- mmc: tmio_mmc_core: don't claim spurious interrupts (bsc#1051510).
- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).
- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).
- mt7601u: bump supported EEPROM version (bsc#1051510).
- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).
- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).
- mtd: docg3: Fix passing zero to 'PTR_ERR' warning in doc_probe_device (bsc#1051510).
- mtd: docg3: fix a possible memory leak of mtd name (bsc#1051510).
- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).
- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).
- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).
- mwifiex: Make resume actually do something useful again on SDIO cards (bsc#1111666).
- mwifiex: don't advertise IBSS features without FW support (bsc#1129770).
- mwifiex: prevent an array overflow (bsc#1051510).
- mwl8k: Fix rate_idx underflow (bsc#1051510).
- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).
- net/ibmvnic: Update carrier state after link state change (bsc#1135100).
- net/mlx5: Avoid reloading already removed devices (bsc#1103990 FATE#326006).
- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990 FATE#326006).
- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 FATE#326006).
- net/mlx5: Set completion EQs as shared resources (bsc#1103991 FATE#326007).
- net/mlx5: Update pci error handler entries and command translation (bsc#1103991 FATE#326007).
- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990 FATE#326006).
- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 FATE#326006).
- net/mlx5e: Fix trailing semicolon (bsc#1075020).
- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990 FATE#326006).
- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).
- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 FATE#326006).
- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).
- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).
- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 FATE#326006).
- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).
- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).
- net/sched: don't dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).
- net/sched: don't dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).
- net/smc: add pnet table namespace support (bsc#1129845 LTC#176252).
- net/smc: add smcd support to the pnet table (bsc#1129845 LTC#176252).
- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1129845 LTC#176252).
- net/smc: allow pnetid-less configuration (bsc#1129845 LTC#176252).
- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).
- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1129845 LTC#176252).
- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).
- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).
- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).
- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).
- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).
- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).
- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).
- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).
- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).
- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).
- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).
- net/smc: return booleans instead of integers (bsc#1096003, FATE#325023, LTC#164003).
- net/smc: rework pnet table (bsc#1129845 LTC#176252).
- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).
- net/tls: avoid NULL pointer deref on nskb sk in fallback (bsc#1109837).
- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).
- net/tls: don't copy negative amounts of data in reencrypt (bsc#1109837).
- net/tls: don't ignore netdev notifications if no TLS features (bsc#1109837).
- net/tls: don't leak IV and record seq when offload fails (bsc#1109837).
- net/tls: don't leak partially sent record in device mode (bsc#1109837).
- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).
- net/tls: fix copy to fragments in reencrypt (bsc#1109837).
- net/tls: fix page double free on TX cleanup (bsc#1109837).
- net/tls: fix refcount adjustment in fallback (bsc#1109837).
- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).
- net/tls: fix state removal with feature flags off (bsc#1109837).
- net/tls: fix the IV leaks (bsc#1109837).
- net/tls: free ctx in sock destruct (bsc#1136353 jsc#SLE-4688).
- net/tls: make sure offload also gets the keys wiped (bsc#1109837).
- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).
- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).
- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).
- net: Fix missing meta data in skb with vlan packet (bsc#1109837).
- net: chelsio: Add a missing check on cudg_get_buffer (bsc#1136345 jsc#SLE-4681).
- net: core: support XDP generic on stacked devices (bsc#1109837).
- net: cxgb4: fix various indentation issues (bsc#1136345 jsc#SLE-4681).
- net: don't clear sock sk early to avoid trouble in strparser (bsc#1103990 FATE#326006).
- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).
- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).
- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).
- net: ena: add good checksum counter (bsc#1138879).
- net: ena: add handling of llq max tx burst size (bsc#1138879).
- net: ena: add newline at the end of pr_err prints (bsc#1138879).
- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).
- net: ena: allow automatic fallback to polling mode (bsc#1138879).
- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).
- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).
- net: ena: enable negotiating larger Rx ring size (bsc#1138879).
- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).
- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).
- net: ena: fix incorrect test of supported hash function (bsc#1138879).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).
- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).
- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).
- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).
- net: ena: gcc 8: fix compilation warning (bsc#1138879).
- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).
- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).
- net: ena: optimise calculations for CQ doorbell (bsc#1138879).
- net: ena: remove inline keyword from functions in *.c (bsc#1138879).
- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).
- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).
- net: ena: use dev_info_once instead of static variable (bsc#1138879).
- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).
- net: hns3: Add handling of MAC tunnel interruption (bsc#1104353 bsc#1134983).
- net: hns3: Add support for netif message level settings (bsc#1104353 bsc#1134989).
- net: hns3: Fix inconsistent indenting (bsc#1140676).
- net: hns3: Make hclge_destroy_cmd_queue static (bsc#1104353 bsc#1137201).
- net: hns3: Make hclgevf_update_link_mode static (bsc#1104353 bsc#1137201).
- net: hns3: add counter for times RX pages gets allocated (bsc#1104353 bsc#1134947).
- net: hns3: add error handler for initializing command queue (bsc#1104353 bsc#1135058).
- net: hns3: add function type check for debugfs help information (bsc#1104353 bsc#1134980).
- net: hns3: add hns3_gro_complete for HW GRO process (bsc#1104353 bsc#1135051).
- net: hns3: add linearizing checking for TSO case (bsc#1104353 bsc#1134947).
- net: hns3: add queue's statistics update to service task (bsc#1104353 bsc#1134981).
- net: hns3: add reset statistics for VF (bsc#1104353 bsc#1134995).
- net: hns3: add reset statistics info for PF (bsc#1104353 bsc#1134995).
- net: hns3: add some debug info for hclgevf_get_mbx_resp() (bsc#1104353 bsc#1134994).
- net: hns3: add some debug information for hclge_check_event_cause (bsc#1104353 bsc#1134994).
- net: hns3: add support for dump ncl config by debugfs (bsc#1104353 bsc#1134987).
- net: hns3: adjust the timing of hns3_client_stop when unloading (bsc#1104353 bsc#1137201).
- net: hns3: always assume no drop TC for performance reason (bsc#1104353 bsc#1135049).
- net: hns3: check 1000M half for hns3_ethtool_ops.set_link_ksettings (bsc#1104353 bsc#1137201).
- net: hns3: check resetting status in hns3_get_stats() (bsc#1104353 bsc#1137201).
- net: hns3: code optimization for command queue' spin lock (bsc#1104353 bsc#1135042).
- net: hns3: combine len and checksum handling for inner and outer header (bsc#1104353 bsc#1134947).
- net: hns3: deactive the reset timer when reset successfully (bsc#1104353 bsc#1137201).
- net: hns3: divide shared buffer between TC (bsc#1104353 bsc#1135047).
- net: hns3: do not initialize MDIO bus when PHY is inexistent (bsc#1104353 bsc#1135045).
- net: hns3: do not request reset when hardware resetting (bsc#1104353 bsc#1137201).
- net: hns3: dump more information when tx timeout happens (bsc#1104353 bsc#1134990).
- net: hns3: fix VLAN offload handle for VLAN inserted by port (bsc#1104353 bsc#1135053).
- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).
- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).
- net: hns3: fix for HNS3_RXD_GRO_SIZE_M macro (bsc#1104353 bsc#1137201).
- net: hns3: fix for tunnel type handling in hns3_rx_checksum (bsc#1104353 bsc#1134946).
- net: hns3: fix for vport bw_limit overflow problem (bsc#1104353 bsc#1134998).
- net: hns3: fix keep_alive_timer not stop problem (bsc#1104353 bsc#1135055).
- net: hns3: fix loop condition of hns3_get_tx_timeo_queue_info() (bsc#1104353 bsc#1134990).
- net: hns3: fix pause configure fail problem (bsc#1104353 bsc#1134951 bsc#1134951).
- net: hns3: fix set port based VLAN for PF (bsc#1104353 bsc#1135053).
- net: hns3: fix set port based VLAN issue for VF (bsc#1104353 bsc#1135053).
- net: hns3: fix sparse: warning when calling hclge_set_vlan_filter_hw() (bsc#1104353 bsc#1134999).
- net: hns3: free the pending skb when clean RX ring (bsc#1104353 bsc#1135044).
- net: hns3: handle pending reset while reset fail (bsc#1104353 bsc#1135058).
- net: hns3: handle the BD info on the last BD of the packet (bsc#1104353 bsc#1134974).
- net: hns3: ignore lower-level new coming reset (bsc#1104353 bsc#1137201).
- net: hns3: minor refactor for hns3_rx_checksum (bsc#1104353 bsc#1135052).
- net: hns3: modify VLAN initialization to be compatible with port based VLAN (bsc#1104353 bsc#1135053).
- net: hns3: modify the VF network port media type acquisition method (bsc#1104353 bsc#1137201).
- net: hns3: not reset TQP in the DOWN while VF resetting (bsc#1104353 bsc#1134952).
- net: hns3: not reset vport who not alive when PF reset (bsc#1104353 bsc#1137201).
- net: hns3: optimize the barrier using when cleaning TX BD (bsc#1104353 bsc#1134945).
- net: hns3: prevent change MTU when resetting (bsc#1104353 bsc#1137201).
- net: hns3: prevent double free in hns3_put_ring_config() (bsc#1104353 bsc#1134950).
- net: hns3: reduce resources use in kdump kernel (bsc#1104353 bsc#1137201).
- net: hns3: refactor BD filling for l2l3l4 info (bsc#1104353 bsc#1134947).
- net: hns3: refine tx timeout count handle (bsc#1104353 bsc#1134990).
- net: hns3: remove reset after command send failed (bsc#1104353 bsc#1134949).
- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).
- net: hns3: return 0 and print warning when hit duplicate MAC (bsc#1104353 bsc#1137201).
- net: hns3: set dividual reset level for all RAS and MSI-X errors (bsc#1104353 bsc#1135046).
- net: hns3: set up the vport alive state while reinitializing (bsc#1104353 bsc#1137201).
- net: hns3: set vport alive state to default while resetting (bsc#1104353 bsc#1137201).
- net: hns3: some cleanup for struct hns3_enet_ring (bsc#1104353 bsc#1134947).
- net: hns3: stop mailbox handling when command queue need re-init (bsc#1104353 bsc#1135058).
- net: hns3: stop sending keep alive msg when VF command queue needs reinit (bsc#1104353 bsc#1134972).
- net: hns3: unify maybe_stop_tx for TSO and non-TSO case (bsc#1104353 bsc#1134947).
- net: hns3: unify the page reusing for page size 4K and 64K (bsc#1104353 bsc#1134947).
- net: hns3: use atomic_t replace u32 for arq's count (bsc#1104353 bsc#1134953).
- net: hns3: use devm_kcalloc when allocating desc_cb (bsc#1104353 bsc#1134947).
- net: hns3: use napi_schedule_irqoff in hard interrupts handlers (bsc#1104353 bsc#1134947).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).
- net: hns: Fix loopback test failed at copper ports (bsc#1140676).
- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).
- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).
- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).
- net: hns: fix unsigned comparison to less than zero (bsc#1140676).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113 FATE#326472).
- net: phy: marvell: Enable interrupt function on LED2 pin (bsc#1135018).
- net: phy: marvell: add new default led configure for m88e151x (bsc#1135018).
- net: phy: marvell: change default m88e1510 LED configuration (bsc#1135018).
- net: smc_close: mark expected switch fall-through (bsc#1096003, FATE#325023, LTC#164003).
- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).
- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).
- net: use indirect call wrappers at GRO network layer (bsc#1124503).
- net: use indirect call wrappers at GRO transport layer (bsc#1124503).
- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).
- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).
- nfs: Fix dentry revalidation on nfsv4 lookup (bsc#1132618).
- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).
- nl80211: fix station_info pertid memory leak (bsc#1051510).
- nvme-fc: use separate work queue to avoid warning (bsc#1131673).
- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).
- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1130937).
- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).
- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).
- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).
- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).
- nvme: Do not remove namespaces during reset (bsc#1131673).
- nvme: add proper discard setup for the multipath device (bsc#1114638).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- nvme: fix the dangerous reference of namespaces list (bsc#1131673).
- nvme: flush scan_work when resetting controller (bsc#1131673).
- nvme: make sure ns head inherits underlying device limits (bsc#1131673).
- nvme: only reconfigure discard if necessary (bsc#1114638).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- nvmem: Don't let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- objtool: Fix function fallthrough detection (bsc#1058115).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).
- openvswitch: add seqadj extension when NAT is used (bsc#1051510).
- openvswitch: fix flow actions reallocation (bsc#1051510).
- overflow: Fix -Wtype-limits compilation warnings (bsc#1111666).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).
- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).
- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).
- pci/aer: Use cached AER Capability offset (bsc#1142623).
- pci/p2pdma: Fix missing check for dma_virt_ops (bsc#1111666).
- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).
- pci/portdrv: Consolidate comments (bsc#1142623).
- pci/portdrv: Disable port driver in compat mode (bsc#1142623).
- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).
- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).
- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).
- pci: Init PCIe feature bits for managed host bridge alloc (bsc#1111666).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci: pciehp: Convert to threaded IRQ (bsc#1133005).
- pci: pciehp: Ignore Link State Changes after powering off a slot (bsc#1133005).
- pci: pciehp: Tolerate Presence Detect hardwired to zero (bsc#1133016).
- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).
- perf/x86/amd: Add event map for AMD Family 17h (bsc#1134223).
- perf/x86/amd: Update generic hardware cache events for Family 17h (bsc#1134223).
- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).
- phy: sun4i-usb: Support set_mode to USB_HOST for non-OTG PHYs (bsc#1051510).
- pinctrl/amd: add get_direction handler (bsc#1140463).
- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).
- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).
- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).
- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).
- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).
- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).
- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).
- platform/x86: intel_punit_ipc: Revert 'Fix resource ioremap warning' (bsc#1051510).
- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).
- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).
- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).
- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).
- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).
- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).
- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).
- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).
- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).
- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).
- platform/x86: mlx-platform: Remove unused define (bsc#1112374).
- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).
- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).
- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).
- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).
- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).
- pm: acpi/PCI: Resume all devices during hibernation (bsc#1111666).
- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).
- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- powerpc/64s: Fix logic when handling unknown CPU features (bsc#1055117).
- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).
- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).
- powerpc/hugetlb: Handle mmap_min_addr correctly in get_unmapped_area callback (bsc#1131900).
- powerpc/kvm: Save and restore host AMR/IAMR/UAMOR (bsc#1061840).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, fate#323286, git-fixes).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, fate#323286, git-fixes).
- powerpc/mm: Add missing tracepoint for tlbie (bsc#1055117, git-fixes).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Check secondary hash page table (bsc#1065729).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, fate#323286, git-fixes).
- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).
- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).
- powerpc/numa: improve control of topology updates (bsc#1133584).
- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).
- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).
- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1055121).
- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).
- powerpc/powernv/ioda2: Remove redundant free of TCE pages (bsc#1061840).
- powerpc/powernv/ioda: Allocate indirect TCE levels of cached userspace addresses on demand (bsc#1061840).
- powerpc/powernv/ioda: Fix locked_vm counting for memory used by IOMMU tables (bsc#1061840).
- powerpc/powernv: Don't reprogram SLW image on every KVM guest entry/exit (bsc#1061840).
- powerpc/powernv: Make opal log only readable by root (bsc#1065729).
- powerpc/powernv: Remove never used pnv_power9_force_smt4 (bsc#1061840).
- powerpc/process: Fix sparse address space warnings (bsc#1065729).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc64/ftrace: Include ftrace.h needed for enable/disable calls (bsc#1088804, git-fixes).
- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).
- powerpc: Fix 32-bit KVM-PR lockup and host crash with MacOS guest (bsc#1061840).
- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).
- powerpc: avoid -mno-sched-epilog on GCC 4.9 and newer (bsc#1065729).
- powerpc: consolidate -mno-sched-epilog into FTRACE flags (bsc#1065729).
- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- proc/kcore: don't bounds check against address 0 (bsc#1051510).
- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).
- proc: revalidate kernel thread inodes to root:root (bsc#1051510).
- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).
- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).
- pwm: meson: Don't disable PWM when setting duty repeatedly (bsc#1051510).
- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).
- pwm: stm32: Use 3 cells of_xlate() (bsc#1111666).
- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).
- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the DORQ's attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the DORQ's attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the DORQ's attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the DORQ's attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'faspath' 'fastpath' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'faspath' 'fastpath' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'faspath' 'fastpath' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'faspath' 'fastpath' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'inculde' 'include' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'inculde' 'include' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'inculde' 'include' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'inculde' 'include' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).
- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128971).
- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).
- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).
- qla2xxx: kABI fixes for v10.00.00.14-k (bsc#1136215).
- qla2xxx: kABI fixes for v10.01.00.15-k (bsc#1136215).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qlcnic: remove assumption that vlan_tci != 0 (bsc#1136469 jsc#SLE-4695).
- qlcnic: remove set but not used variables 'cur_rings, max_hw_rings, tx_desc_info' (bsc#1136469 jsc#SLE-4695).
- qlcnic: remove set but not used variables 'op, cmd_op' (bsc#1136469 jsc#SLE-4695).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- qmi_wwan: add Olicard 600 (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).
- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).
- rdma/cxbg: Use correct sizing on buffers holding page DMA addresses (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Add support for 64Byte cqes (bsc#1127371).
- rdma/cxgb4: Add support for kernel mode SRQ's (bsc#1127371).
- rdma/cxgb4: Add support for srq functions and structs (bsc#1127371).
- rdma/cxgb4: Don't expose DMA addresses (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Fix null pointer dereference on alloc_skb failure (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Fix spelling mistake 'immedate' 'immediate' (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Make c4iw_poll_cq_one() easier to analyze (bsc#1127371).
- rdma/cxgb4: Remove a set-but-not-used variable (bsc#1127371).
- rdma/cxgb4: Remove kref accounting for sync operation (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: fix some info leaks (bsc#1127371).
- rdma/hns: Add SCC context allocation support for hip08 (bsc#1104427 bsc#1126206).
- rdma/hns: Add SCC context clr support for hip08 (bsc#1104427 bsc#1126206).
- rdma/hns: Add constraint on the setting of local ACK timeout (bsc#1104427 bsc#1137233).
- rdma/hns: Add the process of AEQ overflow for hip08 (bsc#1104427 bsc#1126206).
- rdma/hns: Add timer allocation support for hip08 (bsc#1104427 bsc#1126206).
- rdma/hns: Bugfix for SCC hem free (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for mapping user db (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for posting multiple srq work request (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for sending with invalidate (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for set hem of SCC (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for the scene without receiver queue (bsc#1104427 bsc#1137233).
- rdma/hns: Configure capacity of hns device (bsc#1104427 bsc#1137236).
- rdma/hns: Delete useful prints for aeq subtype event (bsc#1104427 bsc#1126206).
- rdma/hns: Fix the Oops during rmmod or insmod ko when reset occurs (bsc#1104427 bsc#1137232).
- rdma/hns: Fix the bug with updating rq head pointer when flush cqe (bsc#1104427 bsc#1137233).
- rdma/hns: Fix the chip hanging caused by sending doorbell during reset (bsc#1104427 bsc#1137232).
- rdma/hns: Fix the chip hanging caused by sending mailbox CMQ during reset (bsc#1104427 bsc#1137232).
- rdma/hns: Fix the state of rereg mr (bsc#1104427 bsc#1137236).
- rdma/hns: Hide error print information with roce vf device (bsc#1104427 bsc#1137236).
- rdma/hns: Limit minimum ROCE CQ depth to 64 (bsc#1104427 bsc#1137236).
- rdma/hns: Make some function static (bsc#1104427 bsc#1126206).
- rdma/hns: Modify qp specification according to UM (bsc#1104427 bsc#1137233).
- rdma/hns: Modify the pbl ba page size for hip08 (bsc#1104427 bsc#1137233).
- rdma/hns: Move spin_lock_irqsave to the correct place (bsc#1104427 bsc#1137236).
- rdma/hns: Remove jiffies operation in disable interrupt context (bsc#1104427 bsc#1137236).
- rdma/hns: Remove set but not used variable 'rst' (bsc#1104427 bsc#1126206).
- rdma/hns: Set allocated memory to zero for wrid (bsc#1104427 bsc#1137236).
- rdma/hns: Update CQE specifications (bsc#1104427 bsc#1137236).
- rdma/hns: rdma/hns: Assign rq head pointer when enable rq record db (bsc#1104427 bsc#1137236).
- rdma/iw_cxgb4: Always disconnect when QP is transitioning to TERMINATE state (bsc#1136348 jsc#SLE-4684).
- rdma/iw_cxgb4: Drop __GFP_NOFAIL (bsc#1127371).
- rdma/iwcm: add tos_set bool to iw_cm struct (bsc#1136348 jsc#SLE-4684).
- rdma/qedr: Fix incorrect device rate (bsc#1136188).
- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1136456 jsc#SLE-4689).
- rdma/smc: Replace ib_query_gid with rdma_get_gid_attr (bsc#1131530 LTC#176717).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).
- ring-buffer: Check if memory is available before allocation (bsc#1132531).
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).
- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).
- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).
- rtc: don't reference bogus function pointer in kdoc (bsc#1051510).
- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).
- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).
- rtlwifi: fix potential NULL pointer dereference (bsc#1111666).
- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).
- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).
- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/airq: recognize directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).
- s390/dasd: fix panic for failed online processing (bsc#1132589).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: fix assignment of bus resources (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: fix struct definition for set PCI function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: provide support for MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: remove stale rc (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: remove unused define (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pkey: move pckmo subfunction available checks away from module init (bsc#1128544).
- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/sclp: detect DIRQ facility (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- s390: enable processes for mio instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390: show statistics for MSI IRQs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).
- sc16is7xx: move label 'err_spi' to correct section (bsc#1051510).
- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).
- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).
- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: fix spelling mistake 'Retreiving' 'Retrieving' (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: csiostor: Remove set but not used variable 'pln' (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).
- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst atid (jsc#SLE-4678 bsc#1136342).
- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).
- scsi: hisi: KABI ignore new symbols (bsc#1135038).
- scsi: hisi_sas: Add softreset in hisi_sas_I_T_nexus_reset() (bsc#1135033).
- scsi: hisi_sas: Adjust the printk format of functions hisi_sas_init_device() (bsc#1135037).
- scsi: hisi_sas: Do not fail IT nexus reset for Open Reject timeout (bsc#1135033).
- scsi: hisi_sas: Do not hard reset disk during controller reset (bsc#1135034).
- scsi: hisi_sas: Fix for setting the PHY linkrate when disconnected (bsc#1135038).
- scsi: hisi_sas: Remedy inconsistent PHY down state in software (bsc#1135039).
- scsi: hisi_sas: Send HARD RESET to clear the previous affiliation of STP target port (bsc#1135037).
- scsi: hisi_sas: Set PHY linkrate when disconnected (bsc#1135038).
- scsi: hisi_sas: Some misc tidy-up (bsc#1135031).
- scsi: hisi_sas: Support all RAS events with MSI interrupts (bsc#1135035).
- scsi: hisi_sas: add host reset interface for test (bsc#1135041).
- scsi: hisi_sas: allocate different SAS address for directly attached situation (bsc#1135036).
- scsi: hisi_sas: remove the check of sas_dev status in hisi_sas_I_T_nexus_reset() (bsc#1135037).
- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: libsas: Do discovery on empty PHY to update PHY info (bsc#1135024).
- scsi: libsas: Improve vague log in SAS rediscovery (bsc#1135027).
- scsi: libsas: Inject revalidate event for root port event (bsc#1135026).
- scsi: libsas: Print expander PHY indexes in decimal (bsc#1135021).
- scsi: libsas: Stop hardcoding SAS address length (bsc#1135029).
- scsi: libsas: Support SATA PHY connection rate unmatch fixing during discovery (bsc#1135028).
- scsi: libsas: Try to retain programmed min linkrate for SATA min pathway unmatch fixing (bsc#1135028).
- scsi: libsas: allocate sense buffer for bsg queue (bsc#1131467).
- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Prevent 'use after free' memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set but not used variable 'phys_id' (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).
- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).
- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).
- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).
- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).
- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).
- scsi: megaraid_sas: correct an info message (bsc#1136271).
- scsi: megaraid_sas: driver version update (bsc#1136271).
- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for ATLAS PCIe switch (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).
- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add additional checks for io_req sc_cmd validity (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add driver state to 'driver_stats' debugfs node (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Remove set but not used variable 'fr_len' (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fixup bit operations (bsc#1135542).
- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).
- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).
- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Fix spelling mistake 'OUSTANDING' 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).
- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1136215).
- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1136215).
- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1136215).
- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1136215).
- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1136215).
- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).
- scsi: qla2xxx: Add new FW dump template entry types (bsc#1136215).
- scsi: qla2xxx: Add protection mask module parameters (bsc#1136215).
- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1136215).
- scsi: qla2xxx: Add support for setting port speed (bsc#1136215).
- scsi: qla2xxx: Avoid pci IRQ affinity mapping when multiqueue is not supported (bsc#1136215).
- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1136215).
- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1136215).
- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1136215).
- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1136215).
- scsi: qla2xxx: Declare local functions 'static' (bsc#1137444).
- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1136215).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1136215).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1136215).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).
- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1136215).
- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).
- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1136215).
- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1136215).
- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1136215).
- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).
- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).
- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).
- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes 'res' (bsc#1137444).
- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1136215).
- scsi: qla2xxx: Move marker request behind QPair (bsc#1136215).
- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).
- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1136215).
- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1136215).
- scsi: qla2xxx: Remove FW default template (bsc#1136215).
- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).
- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).
- scsi: qla2xxx: Remove unused symbols (bsc#1118139).
- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1136215).
- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1136215).
- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1136215).
- scsi: qla2xxx: Simplify conditional check again (bsc#1136215).
- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).
- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1136215).
- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1136215).
- scsi: qla2xxx: Update flash read/write routine (bsc#1136215).
- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).
- scsi: qla2xxx: avoid printf format warning (bsc#1136215).
- scsi: qla2xxx: check for kstrtol() failure (bsc#1136215).
- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).
- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).
- scsi: qla2xxx: fix spelling mistake: 'existant' - 'existent' (bsc#1118139).
- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).
- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1136215).
- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1136215).
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).
- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).
- scsi: smartpqi: Add retries for device reset (bsc#1133547).
- scsi: smartpqi: Reporting 'logical unit failure' (bsc#1133547).
- scsi: smartpqi: add H3C controller IDs (bsc#1133547).
- scsi: smartpqi: add h3c ssid (bsc#1133547).
- scsi: smartpqi: add no_write_same for logical volumes (bsc#1133547).
- scsi: smartpqi: add ofa support (bsc#1133547).
- scsi: smartpqi: add smp_utils support (bsc#1133547).
- scsi: smartpqi: add spdx (bsc#1133547).
- scsi: smartpqi: add support for PQI Config Table handshake (bsc#1133547).
- scsi: smartpqi: add support for huawei controllers (bsc#1133547).
- scsi: smartpqi: add sysfs attributes (bsc#1133547).
- scsi: smartpqi: allow for larger raid maps (bsc#1133547).
- scsi: smartpqi: bump driver version (bsc#1133547).
- scsi: smartpqi: bump driver version (bsc#1133547).
- scsi: smartpqi: call pqi_free_interrupts() in pqi_shutdown() (bsc#1133547).
- scsi: smartpqi: check for null device pointers (bsc#1133547).
- scsi: smartpqi: correct host serial num for ssa (bsc#1133547).
- scsi: smartpqi: correct lun reset issues (bsc#1133547).
- scsi: smartpqi: correct volume status (bsc#1133547).
- scsi: smartpqi: do not offline disks for transient did no connect conditions (bsc#1133547).
- scsi: smartpqi: enhance numa node detection (bsc#1133547).
- scsi: smartpqi: fix build warnings (bsc#1133547).
- scsi: smartpqi: fix disk name mount point (bsc#1133547).
- scsi: smartpqi: fully convert to the generic DMA API (bsc#1133547).
- scsi: smartpqi: increase LUN reset timeout (bsc#1133547).
- scsi: smartpqi: increase fw status register read timeout (bsc#1133547).
- scsi: smartpqi: refactor sending controller raid requests (bsc#1133547).
- scsi: smartpqi: turn off lun data caching for ptraid (bsc#1133547).
- scsi: smartpqi: update copyright (bsc#1133547).
- scsi: smartpqi: update driver version (bsc#1133547).
- scsi: smartpqi: wake up drives after os resumes from suspend (bsc#1133547).
- scsi: smartpqi_init: fix boolean expression in pqi_device_remove_start (bsc#1133547).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).
- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).
- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- serial: uartps: console_setup() can't be placed to init section (bsc#1051510).
- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).
- soc/tegra: fuse: Fix illegal free of IO base address (bsc#1051510).
- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi-mem: fix kernel-doc for spi_mem_dirmap_{read|write}() (bsc#1111666).
- spi: Add missing pm_runtime_put_noidle() after failed get (bsc#1111666).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: Micrel eth switch: declare missing of table (bsc#1051510).
- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).
- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).
- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).
- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).
- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging: comedi: ni_usb6501: Fix possible double-free of usb_rx_buf (bsc#1051510).
- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bsc#1051510).
- staging: comedi: vmk80xx: Fix possible double-free of usb_rx_buf (bsc#1051510).
- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bsc#1051510).
- staging: iio: ad7192: Fix ad7193 channel address (bsc#1051510).
- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- staging: rtl8712: uninitialized memory in read_bbreg_hdl() (bsc#1051510).
- staging: rtlwifi: Fix potential NULL pointer dereference of kzalloc (bsc#1111666).
- staging: rtlwifi: rtl8822b: fix to avoid potential NULL pointer dereference (bsc#1111666).
- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).
- staging: vt6655: Fix interrupt race condition on device start up (bsc#1051510).
- staging: vt6655: Remove vif check from vnt_interrupt (bsc#1051510).
- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- stm class: Fix an endless loop in channel allocation (bsc#1051510).
- stm class: Fix channel free in stm output free path (bsc#1051510).
- stm class: Prevent division by zero (bsc#1051510).
- supported.conf: Add cls_bpf, sch_ingress to kernel-default-base (bsc#1134743).
- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).
- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).
- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)
- supported.conf: dw_mmc-bluefield is not needed in kernel-default-base (bsc#1131574).
- svm/avic: Fix invalidate logical APIC id entry (bsc#1132726).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC DFR and LDR handling (bsc#1132558).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow for file-max (bsc#1051510).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).
- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- team: Always enable vlan tx offload (bsc#1051510).
- team: set slave to promisc if team is already in promisc mode (bsc#1051510).
- testing: nvdimm: provide SZ_4G constant (bsc#1132982).
- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).
- thermal/int340x_thermal: fix mode setting (bsc#1051510).
- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).
- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).
- tools: bpftool: fix infinite loop in map create (bsc#1109837).
- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).
- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1082555).
- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bsc#1132527).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tracing: Fix a memory leak by early error exit in trace_pid_write() (bsc#1133702).
- tracing: Fix buffer_ref pipe ops (bsc#1133698).
- tracing: Fix partial reading of trace event's id file (bsc#1136573).
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).
- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).
- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).
- tty: serial_core, add install (bnc#1129693).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).
- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).
- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).
- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).
- usb: chipidea: Grab the (legacy) USB PHY by phandle first (bsc#1051510).
- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).
- usb: f_fs: Avoid crash due to out-of-scope stack ptr access (bsc#1051510).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300 ep[i] (bsc#1051510).
- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).
- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).
- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: u132-hcd: fix resource leak (bsc#1051510).
- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).
- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).
- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).
- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).
- usbnet: fix kernel crash after disconnect (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).
- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).
- vfio/pci: use correct format characters (bsc#1051510).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).
- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).
- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).
- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).
- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).
- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).
- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).
- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).
- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).
- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).
- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).
- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).
- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).
- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).
- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).
- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).
- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).
- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).
- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).
- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).
- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).
- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).
- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).
- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).
- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio: Honour 'may_reduce_num' in vring_create_virtqueue (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).
- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).
- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).
- vsock/virtio: reset connected sockets on device removal (bsc#1051510).
- vt: always call notifier with the console lock held (bsc#1051510).
- vxlan: trivial indenting fix (bsc#1051510).
- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).
- w1: fix the resume command API (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- wil6210: check null pointer in _wil_cfg80211_merge_extra_ies (bsc#1051510).
- wil6210: drop old event after wmi_call timeout (bsc#1111666).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- wil6210: fix return code of wmi_mgmt_tx and wmi_mgmt_tx_ext (bsc#1111666).
- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).
- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bsc#1051510).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86/CPU/AMD: Don't force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/MCE/AMD, EDAC/mce_amd: Add new MP5, NBIO, and pciE SMCA bank types (bsc#1128415).
- x86/MCE/AMD, EDAC/mce_amd: Add new McaTypes for CS, PSP, and SMU units (bsc#1128415).
- x86/MCE/AMD, EDAC/mce_amd: Add new error descriptions for some SMCA bank types (bsc#1128415).
- x86/MCE: Fix kABI for new AMD bank names (bsc#1128415).
- x86/PCI: Fixup RTIT_BAR of Intel Denverton Trace Hub (bsc#1120318).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init (bsc#1132572).
- x86/mce/AMD, EDAC/mce_amd: Enumerate Reserved SMCA bank type (bsc#1128415).
- x86/mce/AMD: Pass the bank number to smca_get_bank_type() (bsc#1128415).
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/mce: Handle varying MCA bank counts (bsc#1128415).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/perf/amd: Remove need to check 'running' bit in NMI handler (bsc#1131438).
- x86/perf/amd: Resolve NMI latency issues for active PMCs (bsc#1131438).
- x86/perf/amd: Resolve race condition when disabling PMC (bsc#1131438).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).
- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86/tsc: Force inlining of cyc2ns bits (bsc#1052904).
- x86/umip: Make the UMIP activated message generic (bsc#1138336).
- x86/umip: Print UMIP line only once (bsc#1138336).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xdp: check device pointer before clearing (bsc#1109837).
- xdp: fix possible cq entry leak (bsc#1109837).
- xdp: fix race on generic receive path (bsc#1109837).
- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).
- xen/pciback: Don't disable PCI_COMMAND on PCI device reset (bsc#1065600).
- xen: Prevent buffer overflow in privcmd ioctl (bsc#1065600).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).
- xfs: add log item pinning error injection tag (bsc#1114427).
- xfs: add the ability to join a held buffer to a defer_ops (bsc#1133674).
- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).
- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).
- xfs: buffer lru reference count error injection tag (bsc#1114427).
- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).
- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).
- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).
- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).
- xfs: check _btree_check_block value (bsc#1123663).
- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).
- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).
- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).
- xfs: create block pointer check functions (bsc#1123663).
- xfs: create inode pointer verifiers (bsc#1114427).
- xfs: detect and fix bad summary counts at mount (bsc#1114427).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: don't clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: don't look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: don't use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: don't use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).
- xfs: export various function for the online scrubber (bsc#1123663).
- xfs: expose errortag knobs via sysfs (bsc#1114427).
- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).
- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).
- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).
- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).
- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).
- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).
- xfs: fix reporting supported extra file attributes for statx() (bsc#1133529).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).
- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).
- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).
- xfs: force summary counter recalc at next mount (bsc#1114427).
- xfs: hold xfs_buf locked between shortform leaf conversion and the addition of an attribute (bsc#1133675).
- xfs: kill meaningless variable 'zero' (bsc#1106011).
- xfs: make errortag a per-mountpoint structure (bsc#1123663).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).
- xfs: move error injection tags into their own file (bsc#1114427).
- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).
- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).
- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).
- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).
- xfs: refactor btree block header checking functions (bsc#1123663).
- xfs: refactor btree pointer checks (bsc#1123663).
- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).
- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: refactor unmount record write (bsc#1114427).
- xfs: refactor xfs_trans_roll (bsc#1133667).
- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).
- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).
- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).
- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove dest file's post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).
- xfs: remove dest file's post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove the ip argument to xfs_defer_finish (bsc#1133672).
- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: remove xfs_zero_range (bsc#1106011).
- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: rename xfs_defer_join to xfs_defer_ijoin (bsc#1133668).
- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).
- xfs: sanity-check the unused space before trying to use it (bsc#1123663).
- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).
- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).
- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).
- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).
- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).
- xhci: Use %zu for printing size_t type (bsc#1051510).
- xhci: update bounce buffer with correct sg num (bsc#1051510).
- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 FATE#326009).
- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).
- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).
Patchnames
SUSE-2019-2430,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2430,SUSE-SLE-Module-RT-15-SP1-2019-2430
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-source-rt", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130: Microarchitectural Store Buffer Data Sampling (MSBDS): Stored buffers on some microprocessors utilizing speculative execution which may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1103186)\n- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1111331)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1136586)\n- CVE-2019-10124: An issue was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() runs on a thp tail page after pmd is split, an attacker could cause a denial of service (bsc#1130699).\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel has multiple race conditions. (bsc#1133188)\n- CVE-2019-11811: An issue was discovered in the Linux kernel There was a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module was removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. (bsc#1134397)\n- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests. (bsc#1133190)\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem. (bsc#1135281)\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bsc#1120843)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bsc#1135603)\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character. (bsc#1134848)\n- CVE-2019-9500: An issue was discovered that lead to brcmfmac heap buffer overflow. (bsc#1132681)\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bsc#1135278)\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bsc#1135278)\n- CVE-2018-16880: A flaw was found in the Linux kernel\u0027s handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, could trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may have lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (bsc#1122767)\n- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)\n- CVE-2019-3882: A flaw was found in the Linux kernel\u0027s vfio interface implementation that permitted violation of the user\u0027s locked memory limit. If a device was bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may have caused a system memory exhaustion and thus a denial of service (DoS). (bsc#1131427)\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bsc#1136424)\n- CVE-2019-8564: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132673)\n- CVE-2019-9503: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132828)\n- CVE-2019-9003: In the Linux kernel, attackers could trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a \u0027service ipmievd restart\u0027 loop. (bsc#1126704)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.\n- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2019-12817: On the PowerPC architecture, local attackers could access other users processes memory (bnc#1138263).\n- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image was exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).\n- CVE-2019-13233: In arch/x86/lib/insn-eval.c in the Linux kernel, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. (bnc#1143189)\n- CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \u0027double fetch\u0027 vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used. (bsc#1136922)\n- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. (bsc#1136598)\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling nexthdr (bsc#1051510).\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- 9p: do not trust pdu content for stat item size (bsc#1051510).\n- ARM: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- ARM: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- ARM: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- ARM: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- ARM: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- ARM: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- ARM: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- ARM: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- ARM: iop: don\u0027t use using 64-bit DMA masks (bsc#1051510).\n- ARM: orion: don\u0027t use using 64-bit DMA masks (bsc#1051510).\n- ARM: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- ARM: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- ARM: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- ASoC : cs4265 : readable register too low (bsc#1051510).\n- ASoC: Intel: avoid Oops if DMA setup fails (bsc#1051510).\n- ASoC: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).\n- ASoC: cs4270: Set auto-increment bit for register writes (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fix valid stream condition (bsc#1051510).\n- ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_esai: Fix missing break in switch statement (bsc#1051510).\n- ASoC: fsl_esai: fix channel swap issue when stream starts (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: fix S/PDIF DAI (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- ASoC: max98090: Fix restore of DAPM Muxes (bsc#1051510).\n- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- ASoC: nau8810: fix the issue of widget with prefixed name (bsc#1051510).\n- ASoC: nau8824: fix the issue of the widget with prefix name (bsc#1051510).\n- ASoC: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).\n- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ASoC: stm32: fix sai driver name initialisation (bsc#1051510).\n- ASoC: tlv320aic32x4: Fix Common Pins (bsc#1051510).\n- ASoC: topology: free created components in tplg load error (bsc#1051510).\n- ASoC: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).\n- ASoC:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).\n- Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Backporting hwpoison fixes\n- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).\n- Bluetooth: btusb: request wake pin with NOAUTOEN (bsc#1051510).\n- Bluetooth: hidp: fix buffer overflow (bsc#1051510).\n- CIFS: Do not count -ENODATA as failure for query directory (bsc#1051510).\n- CIFS: Do not hide EINTR after sending network packets (bsc#1051510).\n- CIFS: Do not reconnect TCP session in add_credits() (bsc#1051510).\n- CIFS: Do not reset lease state to NONE on lease break (bsc#1051510).\n- CIFS: Fix adjustment of credits for MTU requests (bsc#1051510).\n- CIFS: Fix credit calculation for encrypted reads with errors (bsc#1051510).\n- CIFS: Fix credits calculations for reads with errors (bsc#1051510).\n- CIFS: Fix possible hang during async MTU reads and writes (bsc#1051510).\n- CIFS: Fix read after write for files with read caching (bsc#1051510).\n- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).\n- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).\n- Correct iwlwifi 22000 series ucode file name (bsc#1142673)\n- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- Disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bsc#1051510).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- Fix cpu online check (bsc#1051510).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: core: move Usage Page concatenation to Main item (bsc#1093389).\n- HID: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).\n- HID: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- HID: input: add mapping for Assistant key (bsc#1051510).\n- HID: input: add mapping for Expose/Overview key (bsc#1051510).\n- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- HID: intel-ish-hid: avoid binding wrong ishtp_cl_device (bsc#1051510).\n- HID: intel-ish: ipc: handle PIMR before ish_wakeup also clear PISR busy_clear bit (bsc#1051510).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: Don\u0027t report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Don\u0027t set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: correct touch resolution x/y typo (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: Correct pad syncing (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685 FATE#325854).\n- IB/hfi1: Create inline to get extended headers (bsc#1114685 FATE#325854).\n- IB/hfi1: Validate fault injection opcode user input (bsc#1114685 FATE#325854).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1103992 FATE#326009).\n- IB/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991 FATE#326007).\n- IB/mlx5: Verify DEVX general object type correctly (bsc#1103991 FATE#326007).\n- Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- Input: introduce KEY_ASSISTANT (bsc#1051510).\n- Input: psmouse - fix build error of multiple definition (bsc#1051510).\n- Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bsc#1051510).\n- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- Input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- Input: synaptics-rmi4 - write config register values to the right offset (bsc#1051510).\n- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- KEYS: always initialize keyring_index_key::desc_len (bsc#1051510).\n- KEYS: user: Align the payload buffer (bsc#1051510).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1114279).\n- MD: fix invalid stored role for a disk (bsc#1051510).\n- NFC: nci: Add some bounds checking in nci_hci_cmd_received() (bsc#1051510).\n- PCI/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992 FATE#326009).\n- PCI: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bsc#1051510).\n- PCI: Always allow probing with driver_override (bsc#1051510).\n- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- PCI: Return error if cannot probe VF (bsc#1051510).\n- PCI: designware-ep: Read-only registers need DBI_RO_WR_EN to be writable (bsc#1051510).\n- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- PM / core: Propagate dev power.wakeup_path when no callbacks (bsc#1051510).\n- RAS/CEC: Check the correct variable in the debugfs error handling (bsc#1085535).\n- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- RAS/CEC: Fix binary search function (bsc#1114279).\n- RDMA/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992 FATE#326009).\n- RDMA/mlx5: Do not allow the user to write to the clock page (bsc#1103991 FATE#326007).\n- RDMA/mlx5: Initialize roce port info before multiport master init (bsc#1103991 FATE#326007).\n- RDMA/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992 FATE#326009).\n- RDMA/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992 FATE#326009).\n- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).\n- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).\n- RDMA/srp: Accept again source addresses that do not have a port number (bsc#1103992 FATE#326009).\n- RDMA/srp: Document srp_parse_in() arguments (bsc#1103992 FATE#326009).\n- RDMA/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992 FATE#326009).\n- Re-export snd_cards for kABI compatibility (bsc#1051510).\n- Revert \u0027Sign non-x86 kernels when possible (boo#1134303)\u0027 \n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027net: ena: ethtool: add extra properties retrieval via get_priv_flags\u0027 (bsc#1138879).\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027 This broke the build with older gcc instead.\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- SMB3: Fix endian warning (bsc#1137884).\n- UAS: fix alignment of scatter/gather segments (bsc#1129770).\n- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- USB: cdc-acm: fix unthrottle races (bsc#1051510).\n- USB: core: Don\u0027t unbind interfaces following device reset failure (bsc#1051510).\n- USB: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).\n- USB: core: Fix unterminated string returned by usb_string() (bsc#1051510).\n- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- USB: rio500: refuse more than one device at a time (bsc#1051510).\n- USB: serial: cp210x: fix GPIO in autosuspend (bsc#1120902).\n- USB: serial: f81232: fix interrupt worker not stop (bsc#1051510).\n- USB: serial: fix unthrottle races (bsc#1051510).\n- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- USB: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).\n- USB: yurex: Fix protection fault after device removal (bsc#1051510).\n- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- acpi / SBS: Fix GPE storm on recent MacBookPro\u0027s (bsc#1051510).\n- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- acpi / utils: Drop reference in test for device presence (bsc#1051510).\n- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).\n- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpi: PM: Set enable_for_wake for wakeup GPEs during suspend-to-idle (bsc#1111666).\n- acpi: button: reinitialize button state upon resume (bsc#1051510).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpi: property: restore _DSD data subnodes GUID comment (bsc#1111666).\n- acpiCA: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- acpiCA: Clear status of GPEs on first direct enable (bsc#1111666).\n- acpiCA: Namespace: remove address node from global list after method termination (bsc#1051510).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- alsa: PCM: check if ops are defined before suspending PCM (bsc#1051510).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Don\u0027t allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: core: Don\u0027t refer to snd_cards array directly (bsc#1051510).\n- alsa: core: Fix card races between register and disconnect (bsc#1051510).\n- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Add two more machines to the power_save_blacklist (bsc#1051510).\n- alsa: hda - Don\u0027t resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).\n- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).\n- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).\n- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).\n- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).\n- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).\n- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: hda/realtek - EAPD turn on later (bsc#1051510).\n- alsa: hda/realtek - Enable micmute LED for Huawei laptops (bsc#1051510).\n- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- alsa: hda/realtek - Move to ACT_INIT state (bsc#1111666).\n- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- alsa: hda/realtek - Support low power consumption for ALC256 (bsc#1051510).\n- alsa: hda/realtek - Support low power consumption for ALC295 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: hda/realtek - add two more pin configuration sets to quirk table (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek: Enable headset MIC of Acer TravelMate B114-21 with ALC233 (bsc#1111666).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda: Initialize power_state field properly (bsc#1051510).\n- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: info: Fix racy addition/deletion of nodes (bsc#1051510).\n- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: line6: use dynamic buffers (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).\n- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).\n- alsa: seq: Fix OOB-reads from strlcpy (bsc#1051510).\n- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).\n- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).\n- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).\n- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).\n- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).\n- alsa: timer: Coding style fixes (bsc#1051510).\n- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).\n- alsa: timer: Make sure to clear pending ack list (bsc#1051510).\n- alsa: timer: Revert active callback sync check at close (bsc#1051510).\n- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).\n- alsa: timer: Unify timer callback process code (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).\n- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).\n- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- alsa: usx2y: fix a double free bug (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- arm64: fix acpi dependencies (bsc#1117158).\n- assume flash part size to be 4MB, if it can\u0027t be determined (bsc#1127371).\n- at76c50x-usb: Don\u0027t register led_trigger if usb_register_driver failed (bsc#1051510).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: avoid possible string overflow (bsc#1051510).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: fix PCIE device wake up failed (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: snoc: fix unbalanced clock error handling (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- audit: fix a memleak caused by auditing load module (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- batman-adv: Reduce claim hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: Reduce tt_global hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: Reduce tt_local hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set flush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).\n- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add comment for cache_set fill_iter (bsc#1130972).\n- bcache: add comment for cache_set fill_iter (bsc#1130972).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(b write_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: destroy dc writeback_write_wq if failed to create dc writeback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: set largest seq to ja seq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blk-mq: Avoid that submitting a bio concurrently with device removal triggers a crash (bsc#1131673).\n- blk-mq: adjust debugfs and sysfs register when updating nr_hw_queues (bsc#1131673).\n- blk-mq: change gfp flags to GFP_NOIO in blk_mq_realloc_hw_ctxs (bsc#1131673).\n- blk-mq: fallback to previous nr_hw_queues when updating fails (bsc#1131673).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- blk-mq: init hctx sched after update ctx and hctx mapping (bsc#1131673).\n- blk-mq: realloc hctx when hw queue is mapped to another node (bsc#1131673).\n- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter (bsc#1131673).\n- blkcg: Introduce blkg_root_lookup() (bsc#1131673).\n- blkcg: Make blkg_root_lookup() work for queues in bypass mode (bsc#1131673).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: Ensure that a request queue is dissociated from the cgroup controller (bsc#1131673).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- block: Fix a race between request queue removal and the block cgroup controller (bsc#1131673).\n- block: Introduce blk_exit_queue() (bsc#1131673).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- block: kABI fixes for bio_rewind_iter() removal (bsc#1131673).\n- block: remove bio_rewind_iter() (bsc#1131673).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf() (bsc#1133731).\n- bnx2x: Add support for detection of P2P event packets (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Bump up driver version to 1.713.36 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnx2x: Remove set but not used variable \u0027mfw_vn\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Replace magic numbers with macro definitions (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Use struct_size() in kzalloc() (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Utilize FW 7.13.11.0 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix spelling mistake \u0027dicline\u0027 \u0027decline\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix various indentation issues (bsc#1136498 jsc#SLE-4699).\n- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).\n- bnxt_en: Add support for BCM957504 (bsc#1137224).\n- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745 FATE#325918).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745 FATE#325918).\n- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242 FATE#322914).\n- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745 FATE#325918).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).\n- bpf, devmap: Add missing bulk queue free (bsc#1109837).\n- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf: fix use after free in bpf_evict_inode (bsc#1083647).\n- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).\n- bpf: sockmap fix msg sg.size account on ingress skb (bsc#1109837).\n- bpf: sockmap remove duplicate queue free (bsc#1109837).\n- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).\n- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix NULL pointer derefence during USB disconnect (bsc#1111666).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- brcmfmac: fix leak of mypkt on error return path (bsc#1111666).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- broadcom: Mark expected switch fall-throughs (bsc#1136498 jsc#SLE-4699).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: fix assertion failure on fsync with NO_HOLES enabled (bsc#1131848).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix incorrect file size after shrinking truncate and fsync (bsc#1130195).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: remove WARN_ON in log_dir_items (bsc#1131847).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- cdrom: Fix race condition in cdrom_sysctl_register (bsc#1051510).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: factor out ceph_lookup_inode() (bsc#1138681).\n- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).\n- ceph: fix ci i_head_snapc leak (bsc#1122776).\n- ceph: fix ci i_head_snapc leak (bsc#1122776).\n- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).\n- ceph: quota: fix quota subdir mounts (bsc#1138681).\n- ceph: remove duplicated filelock ref increase (bsc#1138681).\n- cfg80211: Handle WMM rules in regulatory domain intersection (bsc#1111666).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- cgroup: fix parsing empty mount option string (bsc#1133094).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- chelsio: use BUG() instead of BUG_ON(1) (bsc#1136345 jsc#SLE-4681).\n- cifs: Fix potential OOB access of lock element array (bsc#1051510).\n- cifs: don\u0027t dereference smb_file_target before null check (bsc#1051510). \n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- clk: fractional-divider: check parent rate only if flag is set (bsc#1051510).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Don\u0027t yell about bad mmc phases when getting (bsc#1051510).\n- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: rockchip: fix frac settings of GPLL clock for rk3328 (bsc#1051510).\n- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- clk: x86: Add system specific quirk to mark clocks as critical (bsc#1051510).\n- config: arm64: enable CN99xx uncore pmu References: bsc#1117114\n- configfs: Fix use-after-free when accessing sd s_dentry (bsc#1051510).\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bsc#1112178). \n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU doesn\u0027t support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: arm/aes-neonbs - don\u0027t access already-freed walk.iv (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: caam - add missing put_device() call (bsc#1129770).\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: caam/qi2 - fix DMA mapping of stack memory (bsc#1111666).\n- crypto: caam/qi2 - fix zero-length buffer DMA mapping (bsc#1111666).\n- crypto: caam/qi2 - generate hash keys in-place (bsc#1111666).\n- crypto: ccm - fix incompatibility between \u0027ccm\u0027 and \u0027ccm_base\u0027 (bsc#1051510).\n- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).\n- crypto: chcr - ESN for Inline IPSec Tx (bsc#1136353 jsc#SLE-4688).\n- crypto: chcr - small packet Tx stalls the queue (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix NULL pointer dereference (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix passing zero to \u0027PTR_ERR\u0027 warning in chcr_aead_op (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix softlockup with heavy I/O (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix wrong error counter increments (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fixed Traffic Stall (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Handle pci shutdown event (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Inline single pdu only (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Reset counters on cxgb4 Detach (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Swap location of AAD and IV sent in WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Use same value for both channel in single WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - avoid using sa_entry imm (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - check set_msg_len overflow in generate_b0 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - clean up various indentation issues (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - cleanup:send addr as value in function argument (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - count incomplete block in IV (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variable \u0027kctx_len\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variables \u0027adap\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove cdev_list_lock (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove set but not used variables \u0027err, adap, request, hws\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: crypto4xx - properly set IV after de- and encrypt (bsc#1051510).\n- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).\n- crypto: gcm - fix incompatibility between \u0027gcm\u0027 and \u0027gcm_base\u0027 (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: pcbc - remove bogus memcpy()s with src == dest (bsc#1051510).\n- crypto: prefix header search paths with $(srctree)/ (bsc#1136353 jsc#SLE-4688).\n- crypto: sha256/arm - fix crash bug in Thumb2 build (bsc#1051510).\n- crypto: sha512/arm - fix crash bug in Thumb2 build (bsc#1051510).\n- crypto: skcipher - don\u0027t WARN on unprocessed data after slow walk step (bsc#1051510).\n- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: x86/poly1305 - fix overflow during partial reduction (bsc#1051510).\n- cxgb4/chtls: Prefix adapter flags with CXGB4 (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Add support for SGE doorbell queue timer (bsc#1127371).\n- cxgb4/cxgb4vf: Display advertised FEC in ethtool (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Fix mac_hlist initialization and free (bsc#1127374).\n- cxgb4/cxgb4vf: Fix up netdev hw_features (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Link management changes (bsc#1127371).\n- cxgb4/cxgb4vf: Program hash region for {t4/t4vf}_change_mac() (bsc#1127371).\n- cxgb4/cxgb4vf_main: Mark expected switch fall-through (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add VF Link state support (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add capability to get/set SGE Doorbell Queue Timer Tick (bsc#1127371).\n- cxgb4: Add flag tc_flower_initialized (bsc#1127371).\n- cxgb4: Add new T5 pci device id 0x50ae (bsc#1127371).\n- cxgb4: Add new T5 pci device ids 0x50af and 0x50b0 (bsc#1127371).\n- cxgb4: Add new T6 pci device ids 0x608a (bsc#1127371).\n- cxgb4: Add new T6 pci device ids 0x608b (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add support for FW_ETH_TX_PKT_VM_WR (bsc#1127371).\n- cxgb4: Add support to read actual provisioned resources (bsc#1127371).\n- cxgb4: Added missing break in ndo_udp_tunnel_{add/del} (bsc#1127371).\n- cxgb4: Delete all hash and TCAM filters before resource cleanup (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Do not return EAGAIN when TCAM is full (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable outer UDP checksum offload for T6 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Export sge_host_page_size to ulds (bsc#1127371).\n- cxgb4: Fix error path in cxgb4_init_module (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Mask out interrupts that are not enabled (bsc#1127175).\n- cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size (bsc#1127371).\n- cxgb4: Revert \u0027cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Support ethtool private flags (bsc#1127371).\n- cxgb4: TLS record offload enable (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Update 1.23.3.0 as the latest firmware supported (bsc#1136345 jsc#SLE-4681).\n- cxgb4: add per rx-queue counter for packet errors (bsc#1127371).\n- cxgb4: add support to display DCB info (bsc#1127371).\n- cxgb4: add tcb flags and tcb rpl struct (bsc#1136345 jsc#SLE-4681).\n- cxgb4: collect ASIC LA dumps from ULP TX (bsc#1127371).\n- cxgb4: collect hardware queue descriptors (bsc#1127371).\n- cxgb4: collect number of free PSTRUCT page pointers (bsc#1127371).\n- cxgb4: convert flower table to use rhashtable (bsc#1127371).\n- cxgb4: cxgb4: use FW_PORT_ACTION_L1_CFG32 for 32 bit capability (bsc#1127371).\n- cxgb4: display number of rx and tx pages free (bsc#1127371).\n- cxgb4: do not return DUPLEX_UNKNOWN when link is down (bsc#1127371).\n- cxgb4: fix the error path of cxgb4_uld_register() (bsc#1127371).\n- cxgb4: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- cxgb4: impose mandatory VLAN usage when non-zero TAG ID (bsc#1127371).\n- cxgb4: kfree mhp after the debug print (bsc#1136345 jsc#SLE-4681).\n- cxgb4: move Tx/Rx free pages collection to common code (bsc#1127371).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove DEFINE_SIMPLE_DEBUGFS_FILE() (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove redundant assignment to vlan_cmd.dropnovlan_fm (bsc#1127371).\n- cxgb4: remove set but not used variables \u0027multitrc, speed\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove the unneeded locks (bsc#1127371).\n- cxgb4: specify IQTYPE in fw_iq_cmd (bsc#1127371).\n- cxgb4: update supported DCB version (bsc#1127371).\n- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).\n- cxgb4: use new fw interface to get the VIN and smt index (bsc#1127371).\n- cxgb4vf: Call netif_carrier_off properly in pci_probe (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Enter debugging mode if FW is inaccessible (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Few more link management changes (bsc#1127374).\n- cxgb4vf: Prefix adapter flags with CXGB4VF (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Revert force link up behaviour (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Update port information in cxgb4vf_open() (bsc#1127374).\n- cxgb4vf: fix memleak in mac_hlist initialization (bsc#1127374).\n- cxgb4vf: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- device_cgroup: fix RCU imbalance in error case (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).\n- dmaengine: axi-dmac: Don\u0027t check the number of frames for alignment (bsc#1051510).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bsc#1051510).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).\n- dmaengine: qcom_hidma: assign channel cookie correctly (bsc#1051510).\n- dmaengine: sh: rcar-dmac: With cyclic DMA residue 0 is valid (bsc#1051510).\n- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).\n- dmaengine: tegra210-adma: restore channel status (bsc#1111666).\n- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).\n- dmaengine: tegra: avoid overflow of byte tracking (bsc#1051510).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base/devres: introduce devm_release_action() (bsc#1103992 FATE#326009).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).\n- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).\n- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: thermal: tsens: Don\u0027t print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).\n- drm/amd/display: If one stream full updates, full update all planes (bsc#1111666).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/amd/display: Set stream mode_changed when connectors change (bsc#1111666).\n- drm/amd/display: Use plane color_space for dpp if specified (bsc#1111666).\n- drm/amd/display: extending AUX SW Timeout (bsc#1111666).\n- drm/amd/display: fix cursor black issue (bsc#1111666).\n- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).\n- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/amdgpu/gmc9: fix VM_L2_CNTL3 programming (bsc#1111666).\n- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).\n- drm/amdkfd: use init_mqd function to allocate object for hid_mqd (CI) (bsc#1111666).\n- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/doc: Drop \u0027content type\u0027 from the legacy kms property table (bsc#1111666).\n- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).\n- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/exynos/mixer: fix MIXER shadow registry synchronisation code (bsc#1111666).\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).\n- drm/fb-helper: generic: Call drm_client_add() after setup is done (bsc#1111666).\n- drm/fb-helper: generic: Don\u0027t take module ref for fbcon (bsc#1111666).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113722)\n- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113956)\n- drm/i915/gvt: Annotate iomem usage (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)\n- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).\n- drm/i915/gvt: Prevent use-after-free in ppgtt_free_all_spt() (bsc#1111666).\n- drm/i915/gvt: Roundup fb height into tile\u0027s height at calucation fb size (bsc#1111666).\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not deliver a workload if its creation fails (bsc#1051510).\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113722)\n- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113956)\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/i915/icl: Whitelist GEN9_SLICE_COMMON_ECO_CHICKEN1 (bsc#1111666).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Disable tv output on i9x5gm (bsc#1086657, bsc#1133897).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).\n- drm/i915: Force 2*96 MHz cdclk on glk/cnl when audio power is enabled (bsc#1111666).\n- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).\n- drm/imx: don\u0027t skip DP channel disable for background plane (bsc#1051510).\n- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).\n- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).\n- drm/lease: Make sure implicit planes are leased (bsc#1111666).\n- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113722)\n- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113956)\n- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).\n- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).\n- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).\n- drm/mediatek: fix possible object reference leak (bsc#1051510).\n- drm/mediatek: fix unbind functions (bsc#1111666).\n- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).\n- drm/meson: Add support for XBGR8888 ABGR8888 formats (bsc#1051510).\n- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).\n- drm/msm: fix fb references in async update (bsc#1111666).\n- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/tu104: initial support (bsc#1133593).\n- drm/nouveau/bar/tu106: initial support (bsc#1133593).\n- drm/nouveau/bios/tu104: initial support (bsc#1133593).\n- drm/nouveau/bios/tu106: initial support (bsc#1133593).\n- drm/nouveau/bios: translate additional memory types (bsc#1133593).\n- drm/nouveau/bios: translate usb-C connector type (bsc#1133593).\n- drm/nouveau/bus/tu104: initial support (bsc#1133593).\n- drm/nouveau/bus/tu106: initial support (bsc#1133593).\n- drm/nouveau/ce/tu104: initial support (bsc#1133593).\n- drm/nouveau/ce/tu106: initial support (bsc#1133593).\n- drm/nouveau/core: increase maximum number of nvdec instances to 3 (bsc#1133593).\n- drm/nouveau/core: recognise TU102 (bsc#1133593).\n- drm/nouveau/core: recognise TU104 (bsc#1133593).\n- drm/nouveau/core: recognise TU106 (bsc#1133593).\n- drm/nouveau/core: support multiple nvdec instances (bsc#1133593).\n- drm/nouveau/devinit/gm200-: export function to upload+execute PMU/PRE_OS (bsc#1133593).\n- drm/nouveau/devinit/tu104: initial support (bsc#1133593).\n- drm/nouveau/devinit/tu106: initial support (bsc#1133593).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/disp/gm200-: add scdc parameter setter (bsc#1133593).\n- drm/nouveau/disp/gv100: fix name of window channels in debug output (bsc#1133593).\n- drm/nouveau/disp/tu104: initial support (bsc#1133593).\n- drm/nouveau/disp/tu106: initial support (bsc#1133593).\n- drm/nouveau/disp: add a way to configure scrambling/tmds for hdmi 2.0 (bsc#1133593).\n- drm/nouveau/disp: add support for setting scdc parameters for high modes (bsc#1133593).\n- drm/nouveau/disp: keep track of high-speed state, program into clock (bsc#1133593).\n- drm/nouveau/disp: take sink support into account for exposing 594mhz (bsc#1133593).\n- drm/nouveau/dma/tu104: initial support (bsc#1133593).\n- drm/nouveau/dma/tu106: initial support (bsc#1133593).\n- drm/nouveau/drm/nouveau: Do not forget to label dp_aux devices (bsc#1133593).\n- drm/nouveau/drm/nouveau: s/nouveau_backlight_exit/nouveau_backlight_fini/ (bsc#1133593).\n- drm/nouveau/drm/nouveau: tegra: Call nouveau_drm_device_init() (bsc#1133593).\n- drm/nouveau/fault/tu104: initial support (bsc#1133593).\n- drm/nouveau/fault/tu106: initial support (bsc#1133593).\n- drm/nouveau/fault: add explicit control over fault buffer interrupts (bsc#1133593).\n- drm/nouveau/fault: remove manual mapping of fault buffers into BAR2 (bsc#1133593).\n- drm/nouveau/fault: store get/put pri address in nvkm_fault_buffer (bsc#1133593).\n- drm/nouveau/fb/tu104: initial support (bsc#1133593).\n- drm/nouveau/fb/tu106: initial support (bsc#1133593).\n- drm/nouveau/fifo/gf100-: call into BAR to reset BARs after MMU fault (bsc#1133593).\n- drm/nouveau/fifo/gk104-: group pbdma functions together (bsc#1133593).\n- drm/nouveau/fifo/gk104-: return channel instance in ctor args (bsc#1133593).\n- drm/nouveau/fifo/gk104-: separate runlist building from committing to hw (bsc#1133593).\n- drm/nouveau/fifo/gk104-: support enabling privileged ce functions (bsc#1133593).\n- drm/nouveau/fifo/gk104-: virtualise pbdma enable function (bsc#1133593).\n- drm/nouveau/fifo/gm200-: read pbdma count more directly (bsc#1133593).\n- drm/nouveau/fifo/gv100: allocate method buffer (bsc#1133593).\n- drm/nouveau/fifo/gv100: return work submission token in channel ctor args (bsc#1133593).\n- drm/nouveau/fifo/tu104: initial support (bsc#1133593).\n- drm/nouveau/fifo/tu106: initial support (bsc#1133593).\n- drm/nouveau/fuse/tu104: initial support (bsc#1133593).\n- drm/nouveau/fuse/tu106: initial support (bsc#1133593).\n- drm/nouveau/gpio/tu104: initial support (bsc#1133593).\n- drm/nouveau/gpio/tu106: initial support (bsc#1133593).\n- drm/nouveau/i2c/tu104: initial support (bsc#1133593).\n- drm/nouveau/i2c/tu106: initial support (bsc#1133593).\n- drm/nouveau/i2c: Disable i2c bus access after fini() (bsc#1113722)\n- drm/nouveau/i2c: Enable i2c pads busses during preinit (bsc#1051510).\n- drm/nouveau/ibus/tu104: initial support (bsc#1133593).\n- drm/nouveau/ibus/tu106: initial support (bsc#1133593).\n- drm/nouveau/imem/nv50: support pinning objects in BAR2 and returning address (bsc#1133593).\n- drm/nouveau/imem/tu104: initial support (bsc#1133593).\n- drm/nouveau/imem/tu106: initial support (bsc#1133593).\n- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).\n- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).\n- drm/nouveau/kms/nv50-: allow more flexibility with lut formats (bsc#1133593).\n- drm/nouveau/kms/tu104: initial support (bsc#1133593).\n- drm/nouveau/ltc/tu104: initial support (bsc#1133593).\n- drm/nouveau/ltc/tu106: initial support (bsc#1133593).\n- drm/nouveau/mc/tu104: initial support (bsc#1133593).\n- drm/nouveau/mc/tu106: initial support (bsc#1133593).\n- drm/nouveau/mmu/tu104: initial support (bsc#1133593).\n- drm/nouveau/mmu/tu106: initial support (bsc#1133593).\n- drm/nouveau/mmu: add more general vmm free/node handling functions (bsc#1133593).\n- drm/nouveau/pci/tu104: initial support (bsc#1133593).\n- drm/nouveau/pci/tu106: initial support (bsc#1133593).\n- drm/nouveau/pmu/tu104: initial support (bsc#1133593).\n- drm/nouveau/pmu/tu106: initial support (bsc#1133593).\n- drm/nouveau/therm/tu104: initial support (bsc#1133593).\n- drm/nouveau/therm/tu106: initial support (bsc#1133593).\n- drm/nouveau/tmr/tu104: initial support (bsc#1133593).\n- drm/nouveau/tmr/tu106: initial support (bsc#1133593).\n- drm/nouveau/top/tu104: initial support (bsc#1133593).\n- drm/nouveau/top/tu106: initial support (bsc#1133593).\n- drm/nouveau/volt/gf117: fix speedo readout register (bsc#1051510).\n- drm/nouveau: Add NV_PRINTK_ONCE and variants (bsc#1133593).\n- drm/nouveau: Add size to vbios.rom file in debugfs (bsc#1133593).\n- drm/nouveau: Add strap_peek to debugfs (bsc#1133593).\n- drm/nouveau: Cleanup indenting in nouveau_backlight.c (bsc#1133593).\n- drm/nouveau: Fix potential memory leak in nouveau_drm_load() (bsc#1133593).\n- drm/nouveau: Move backlight device into nouveau_connector (bsc#1133593).\n- drm/nouveau: Refactor nvXX_backlight_init() (bsc#1133593).\n- drm/nouveau: Remove unecessary dma_fence_ops (bsc#1133593).\n- drm/nouveau: Start using new drm_dev initialization helpers (bsc#1133593).\n- drm/nouveau: Stop using drm_crtc_force_disable (bsc#1051510).\n- drm/nouveau: add DisplayPort CEC-Tunneling-over-AUX support (bsc#1133593).\n- drm/nouveau: register backlight on pascal and newer (bsc#1133593).\n- drm/nouveau: remove left-over struct member (bsc#1133593).\n- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).\n- drm/omap: hdmi4_cec: Fix CEC clock handling for PM (bsc#1111666).\n- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).\n- drm/panel: panel-innolux: set display off in innolux_panel_unprepare (bsc#1111666).\n- drm/pl111: Initialize clock spinlock early (bsc#1111666).\n- drm/pl111: fix possible object reference leak (bsc#1111666).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/rockchip: fix for mailbox read validation (bsc#1111666).\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).\n- drm/rockchip: vop: reset scale mode when win is disabled (bsc#1113722)\n- drm/sun4i: Add missing drm_atomic_helper_shutdown at driver unbind (bsc#1113722)\n- drm/sun4i: Fix component unbinding and component master deletion (bsc#1113722)\n- drm/sun4i: Fix sun8i HDMI PHY clock initialization (bsc#1111666).\n- drm/sun4i: Fix sun8i HDMI PHY configuration for 148.5 MHz (bsc#1111666).\n- drm/sun4i: Set device driver data at bind time for use in unbind (bsc#1113722)\n- drm/sun4i: Unbind components before releasing DRM and memory (bsc#1113722)\n- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).\n- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).\n- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\n- drm/sun4i: tcon top: Fix NULL/invalid pointer dereference in sun8i_tcon_top_un/bind (bsc#1111666).\n- drm/tegra: gem: Fix CPU-cache maintenance for BO\u0027s allocated using get_pages() (bsc#1111666).\n- drm/tegra: hub: Fix dereference before check (bsc#1111666).\n- drm/ttm: Fix bo_global and mem_global kfree error (bsc#1111666).\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/ttm: fix out-of-bounds read in ttm_put_pages() v2 (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/udl: add a release method and delay modeset teardown (bsc#1085536)\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/v3d: Handle errors from IRQ setup (bsc#1111666).\n- drm/vc4: Fix memory leak during gpu reset. (bsc#1113722)\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/vmwgfx: Don\u0027t send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm/vmwgfx: Remove set but not used variable \u0027restart\u0027 (bsc#1111666).\n- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).\n- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- drm: Auto-set allow_fb_modifiers when given modifiers at plane init (bsc#1051510).\n- drm: Fix drm_release() and device unplug (bsc#1111666).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).\n- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).\n- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).\n- drm: bridge: dw-hdmi: Fix overflow workaround for Rockchip SoCs (bsc#1113722)\n- drm: don\u0027t block fb changes for async plane updates (bsc#1111666).\n- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).\n- drm: rcar-du: Fix rcar_du_crtc structure documentation (bsc#1111666).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- drm_dp_cec: add note about good MegaChips 2900 CEC support (bsc#1136978).\n- drm_dp_cec: check that aux has a transfer function (bsc#1136978).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).\n- e1000e: Fix -Wformat-truncation warnings (bsc#1051510).\n- e1000e: fix cyclic resets at link up with active tx (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- ext4: Do not warn when enabling DAX (bsc#1132894).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).\n- fbdev: fbmem: fix memory access if logo is bigger than the screen (bsc#1051510).\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix cgroup_do_mount() handling of failure exits (bsc#1133095).\n- fm10k: Fix a potential NULL pointer dereference (bsc#1051510).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).\n- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).\n- fs: hugetlbfs: fix hwpoison reserve accounting (bsc#1139712) \n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- futex: Cure exit race (bsc#1050549).\n- futex: Ensure that futex address is aligned in handle_futex_death() (bsc#1050549).\n- futex: Handle early deadlock return correctly (bsc#1050549).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bsc#1051510).\n- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpio: gpio-omap: fix level interrupt idling (bsc#1051510).\n- gpio: of: Fix of_gpiochip_add() error path (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- hid: i2c-hid: Ignore input report if there\u0027s no data present on Elan touchpanels (bsc#1133486).\n- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- hwmon: (core) add thermal sensors only if dev of_node is present (bsc#1051510).\n- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- hwrng: virtio - Avoid repeated init of completion (bsc#1051510).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: imx: correct the method of getting private data in notifier_call (bsc#1111666).\n- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).\n- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).\n- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).\n- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).\n- i2c: synquacer: fix enumeration of slave devices (bsc#1111666).\n- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).\n- ib/hw: Remove unneeded semicolons (bsc#1136456 jsc#SLE-4689).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Enable GRO (bsc#1132227).\n- ibmvnic: Fix completion structure initialization (bsc#1131659).\n- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- iio/gyro/bmg160: Use millidegrees for temperature scale (bsc#1051510).\n- iio: Fix scan mask selection (bsc#1051510).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: ad_sigma_delta: select channel when reading register (bsc#1051510).\n- iio: adc: at91: disable adc channel interrupt in timeout case (bsc#1051510).\n- iio: adc: fix warning in Qualcomm PM8xxx HK/XOADC driver (bsc#1051510).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: core: fix a possible circular locking dependency (bsc#1051510).\n- iio: cros_ec: Fix the maths for gyro scale calculation (bsc#1051510).\n- iio: dac: mcp4725: add missing powerdown bits in store eeprom (bsc#1051510).\n- iio: gyro: mpu3050: fix chip ID reading (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- include/linux/bitops.h: introduce BITS_PER_TYPE (bsc#1136345 jsc#SLE-4681).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- infiniband/qedr: Potential null ptr dereference of qp (bsc#1136456 jsc#SLE-4689).\n- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- intel_th: pci: Add Comet Lake support (bsc#1051510).\n- io: accel: kxcjk1013: restore the range after resume (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/amd: Set exclusion range correctly (bsc#1130425).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).\n- ipmi: Prevent use-after-free in deliver_response (bsc#1111666).\n- ipmi: fix sleep-in-atomic in free_user at cleanup SRCU user release_barrier (bsc#1111666).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).\n- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).\n- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).\n- ipvlan: Add the skb mark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Don\u0027t clear eventid when freeing an MSI (bsc#1051510).\n- iw_cxgb*: kzalloc the iwcm verbs struct (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Check for send WR also while posting write with completion WR (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Make function read_tcb() static (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: complete the cached SRQ buffers (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: cq/qp mask depends on bar2 pages in a host page (bsc#1127371).\n- iw_cxgb4: fix srqidx leak during connection abort (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- iw_cxgb4: use listening ep tos when accepting new connections (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when finding ipv6 routes (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when importing the endpoint (bsc#1136348 jsc#SLE-4684).\n- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: correct one of the PCI struct names (bsc#1111666).\n- iwlwifi: don\u0027t WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: fix driver operation for 5350 (bsc#1111666).\n- iwlwifi: fix send hcmd timeout recovery flow (bsc#1129770).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: don\u0027t crash on invalid RX interrupt (bsc#1051510).\n- iwlwifi: pcie: don\u0027t service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kABI workaround for asus-wmi changes (bsc#1051510).\n- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).\n- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kABI: protect functions using struct net_generic (bsc#1129845 LTC#176252).\n- kABI: protect struct smc_ib_device (bsc#1129845 LTC#176252).\n- kABI: protect struct smcd_dev (bsc#1129845 LTC#176252).\n- kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi protect struct iw_cm_id (bsc#1136348 jsc#SLE-4684).\n- kabi protect struct vf_info (bsc#1136347 jsc#SLE-4683).\n- kabi/severities: exclude hns3 symbols (bsc#1134948)\n- kabi/severities: exclude qed* symbols (bsc#1136461)\n- kabi/severities: exclude qed* symbols (bsc#1136461)\n- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- kbuild: strip whitespace in cmd_record_mcount findstring (bsc#1065729).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).\n- kcm: switch order of device registration to fix a crash (bnc#1130527).\n- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).\n- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).\n- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernfs: do not set dentry d_fsdata (boo#1133115).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128904 LTC#176078).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132563).\n- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).\n- kvm: Fix kABI for AMD SMAP Errata workaround (bsc#1133149).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- kvm: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation) (bsc#1133149).\n- kvm: VMX: Compare only a single byte for VMCS\u0027 \u0027launched\u0027 in vCPU-run (bsc#1132555).\n- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132561).\n- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).\n- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bsc#1132564).\n- kvm: nVMX: Sign extend displacements of VMX instr\u0027s mem operands (bsc#1132562).\n- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222\n- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: s390: use created_vcpus in more places (bsc#1136206).\n- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- kvm: x86/mmu: Detect MMIO generation wrap in any address space (bsc#1132570).\n- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132571).\n- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- kvm: x86: Report STibP on GET_SUPPORTED_CPUID (bsc#1111331).\n- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- kvm: x86: fix return value for reserved EFER (bsc#1140992).\n- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- leds: avoid races with workqueue (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib/scatterlist: Fix mapping iterator when sg offset is greater than PAGE_SIZE (bsc#1051510).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libata: fix using DMA buffers on stack (bsc#1051510).\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897). This feature was requested for SLE15 but aws reverted in packaging and master.\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: preallocate message data items (bsc#1135897).\n- libcxgb: fix incorrect ppmax calculation (bsc#1136345 jsc#SLE-4681).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- lightnvm: if LUNs are already allocated fix return (bsc#1085535). \n- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: Honor SW_CRYPTO_CONTROL for unicast keys in AP VLAN mode (bsc#1111666).\n- mac80211: do not call driver wake_tx_queue op during reconfig (bsc#1051510).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: don\u0027t attempt to rename ERR_PTR() debugfs dirs (bsc#1111666).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- md: batch flush requests (bsc#1119680).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).\n- media: cx23885: check allocation return (bsc#1051510).\n- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: mt9m111: set initial frame size other than 0x0 (bsc#1051510).\n- media: mtk-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format doesn\u0027t match (bsc#1051510).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).\n- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).\n- media: sh_veu: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- media: v4l2: Test type instead of cfg type in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- media: vivid: use vfree() instead of kfree() for dev bitmap_cap (bsc#1051510).\n- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).\n- media: wl128x: prevent two potential buffer overflows (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).\n- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).\n- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).\n- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).\n- mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).\n- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).\n- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).\n- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm/debug.c: fix __dump_page when mapping host is not set (bsc#1131934).\n- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992 FATE#326009).\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935).\n- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bsc#1133825).\n- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm: fix race on soft-offlining free huge pages (bsc#1139712). \n- mm: hugetlb: delete dequeue_hwpoisoned_huge_page() (bsc#1139712). \n- mm: hugetlb: prevent reuse of hwpoisoned free hugepages (bsc#1139712). \n- mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (bsc#1139712). \n- mm: hugetlb: soft-offline: dissolve_free_huge_page() return zero on !PageHuge (bsc#bsc#1139712).\n- mm: hugetlb: soft_offline: save compound page order before page migration (bsc#1139712) \n- mm: hwpoison: change PageHWPoison behavior on hugetlb pages (bsc#1139712). \n- mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (bsc#1139712). \n- mm: hwpoison: introduce idenfity_page_state (bsc#1139712). \n- mm: hwpoison: introduce memory_failure_hugetlb() (bsc#1139712). \n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mm: soft-offline: close the race against page allocation (bsc#1139712). \n- mm: soft-offline: dissolve free hugepage if soft-offlined (bsc#1139712). \n- mm: soft-offline: return -EBUSY if set_hwpoison_free_buddy_page() fails (bsc#1139712). \n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mmc: bcm2835 MMC issues (bsc#1070872).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: Fix tag set memory leak (bsc#1111666).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: core: complete HS400 before checking status (bsc#1111666).\n- mmc: core: fix possible use after free of host (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: davinci: remove extraneous __init annotation (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mmc: sdhci: Fix data command CRC error handling (bsc#1051510).\n- mmc: sdhci: Handle auto-command errors (bsc#1051510).\n- mmc: sdhci: Rename SDHCI_ACMD12_ERR and SDHCI_INT_ACMD12ERR (bsc#1051510).\n- mmc: tmio_mmc_core: don\u0027t claim spurious interrupts (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mt7601u: bump supported EEPROM version (bsc#1051510).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- mtd: docg3: Fix passing zero to \u0027PTR_ERR\u0027 warning in doc_probe_device (bsc#1051510).\n- mtd: docg3: fix a possible memory leak of mtd name (bsc#1051510).\n- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).\n- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).\n- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).\n- mwifiex: Make resume actually do something useful again on SDIO cards (bsc#1111666).\n- mwifiex: don\u0027t advertise IBSS features without FW support (bsc#1129770). \n- mwifiex: prevent an array overflow (bsc#1051510).\n- mwl8k: Fix rate_idx underflow (bsc#1051510).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net/mlx5: Avoid reloading already removed devices (bsc#1103990 FATE#326006).\n- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990 FATE#326006).\n- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 FATE#326006).\n- net/mlx5: Set completion EQs as shared resources (bsc#1103991 FATE#326007).\n- net/mlx5: Update pci error handler entries and command translation (bsc#1103991 FATE#326007).\n- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990 FATE#326006).\n- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 FATE#326006).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).\n- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 FATE#326006).\n- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).\n- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).\n- net/sched: don\u0027t dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: don\u0027t dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/smc: add pnet table namespace support (bsc#1129845 LTC#176252).\n- net/smc: add smcd support to the pnet table (bsc#1129845 LTC#176252).\n- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1129845 LTC#176252).\n- net/smc: allow pnetid-less configuration (bsc#1129845 LTC#176252).\n- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).\n- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1129845 LTC#176252).\n- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).\n- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).\n- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).\n- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).\n- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).\n- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).\n- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).\n- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).\n- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).\n- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).\n- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).\n- net/smc: return booleans instead of integers (bsc#1096003, FATE#325023, LTC#164003).\n- net/smc: rework pnet table (bsc#1129845 LTC#176252).\n- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).\n- net/tls: avoid NULL pointer deref on nskb sk in fallback (bsc#1109837).\n- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).\n- net/tls: don\u0027t copy negative amounts of data in reencrypt (bsc#1109837).\n- net/tls: don\u0027t ignore netdev notifications if no TLS features (bsc#1109837).\n- net/tls: don\u0027t leak IV and record seq when offload fails (bsc#1109837).\n- net/tls: don\u0027t leak partially sent record in device mode (bsc#1109837).\n- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).\n- net/tls: fix copy to fragments in reencrypt (bsc#1109837).\n- net/tls: fix page double free on TX cleanup (bsc#1109837).\n- net/tls: fix refcount adjustment in fallback (bsc#1109837).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: fix state removal with feature flags off (bsc#1109837).\n- net/tls: fix the IV leaks (bsc#1109837).\n- net/tls: free ctx in sock destruct (bsc#1136353 jsc#SLE-4688).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).\n- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).\n- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).\n- net: Fix missing meta data in skb with vlan packet (bsc#1109837).\n- net: chelsio: Add a missing check on cudg_get_buffer (bsc#1136345 jsc#SLE-4681).\n- net: core: support XDP generic on stacked devices (bsc#1109837).\n- net: cxgb4: fix various indentation issues (bsc#1136345 jsc#SLE-4681).\n- net: don\u0027t clear sock sk early to avoid trouble in strparser (bsc#1103990 FATE#326006).\n- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).\n- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).\n- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).\n- net: ena: add good checksum counter (bsc#1138879).\n- net: ena: add handling of llq max tx burst size (bsc#1138879).\n- net: ena: add newline at the end of pr_err prints (bsc#1138879).\n- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).\n- net: ena: allow automatic fallback to polling mode (bsc#1138879).\n- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).\n- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).\n- net: ena: enable negotiating larger Rx ring size (bsc#1138879).\n- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).\n- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).\n- net: ena: fix incorrect test of supported hash function (bsc#1138879).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).\n- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).\n- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).\n- net: ena: gcc 8: fix compilation warning (bsc#1138879).\n- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).\n- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).\n- net: ena: optimise calculations for CQ doorbell (bsc#1138879).\n- net: ena: remove inline keyword from functions in *.c (bsc#1138879).\n- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).\n- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).\n- net: ena: use dev_info_once instead of static variable (bsc#1138879).\n- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).\n- net: hns3: Add handling of MAC tunnel interruption (bsc#1104353 bsc#1134983).\n- net: hns3: Add support for netif message level settings (bsc#1104353 bsc#1134989).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns3: Make hclge_destroy_cmd_queue static (bsc#1104353 bsc#1137201).\n- net: hns3: Make hclgevf_update_link_mode static (bsc#1104353 bsc#1137201).\n- net: hns3: add counter for times RX pages gets allocated (bsc#1104353 bsc#1134947).\n- net: hns3: add error handler for initializing command queue (bsc#1104353 bsc#1135058).\n- net: hns3: add function type check for debugfs help information (bsc#1104353 bsc#1134980).\n- net: hns3: add hns3_gro_complete for HW GRO process (bsc#1104353 bsc#1135051).\n- net: hns3: add linearizing checking for TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: add queue\u0027s statistics update to service task (bsc#1104353 bsc#1134981).\n- net: hns3: add reset statistics for VF (bsc#1104353 bsc#1134995).\n- net: hns3: add reset statistics info for PF (bsc#1104353 bsc#1134995).\n- net: hns3: add some debug info for hclgevf_get_mbx_resp() (bsc#1104353 bsc#1134994).\n- net: hns3: add some debug information for hclge_check_event_cause (bsc#1104353 bsc#1134994).\n- net: hns3: add support for dump ncl config by debugfs (bsc#1104353 bsc#1134987).\n- net: hns3: adjust the timing of hns3_client_stop when unloading (bsc#1104353 bsc#1137201).\n- net: hns3: always assume no drop TC for performance reason (bsc#1104353 bsc#1135049).\n- net: hns3: check 1000M half for hns3_ethtool_ops.set_link_ksettings (bsc#1104353 bsc#1137201).\n- net: hns3: check resetting status in hns3_get_stats() (bsc#1104353 bsc#1137201).\n- net: hns3: code optimization for command queue\u0027 spin lock (bsc#1104353 bsc#1135042).\n- net: hns3: combine len and checksum handling for inner and outer header (bsc#1104353 bsc#1134947).\n- net: hns3: deactive the reset timer when reset successfully (bsc#1104353 bsc#1137201).\n- net: hns3: divide shared buffer between TC (bsc#1104353 bsc#1135047).\n- net: hns3: do not initialize MDIO bus when PHY is inexistent (bsc#1104353 bsc#1135045).\n- net: hns3: do not request reset when hardware resetting (bsc#1104353 bsc#1137201).\n- net: hns3: dump more information when tx timeout happens (bsc#1104353 bsc#1134990).\n- net: hns3: fix VLAN offload handle for VLAN inserted by port (bsc#1104353 bsc#1135053).\n- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).\n- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).\n- net: hns3: fix for HNS3_RXD_GRO_SIZE_M macro (bsc#1104353 bsc#1137201).\n- net: hns3: fix for tunnel type handling in hns3_rx_checksum (bsc#1104353 bsc#1134946).\n- net: hns3: fix for vport bw_limit overflow problem (bsc#1104353 bsc#1134998).\n- net: hns3: fix keep_alive_timer not stop problem (bsc#1104353 bsc#1135055).\n- net: hns3: fix loop condition of hns3_get_tx_timeo_queue_info() (bsc#1104353 bsc#1134990).\n- net: hns3: fix pause configure fail problem (bsc#1104353 bsc#1134951 bsc#1134951).\n- net: hns3: fix set port based VLAN for PF (bsc#1104353 bsc#1135053).\n- net: hns3: fix set port based VLAN issue for VF (bsc#1104353 bsc#1135053).\n- net: hns3: fix sparse: warning when calling hclge_set_vlan_filter_hw() (bsc#1104353 bsc#1134999).\n- net: hns3: free the pending skb when clean RX ring (bsc#1104353 bsc#1135044).\n- net: hns3: handle pending reset while reset fail (bsc#1104353 bsc#1135058).\n- net: hns3: handle the BD info on the last BD of the packet (bsc#1104353 bsc#1134974).\n- net: hns3: ignore lower-level new coming reset (bsc#1104353 bsc#1137201).\n- net: hns3: minor refactor for hns3_rx_checksum (bsc#1104353 bsc#1135052).\n- net: hns3: modify VLAN initialization to be compatible with port based VLAN (bsc#1104353 bsc#1135053).\n- net: hns3: modify the VF network port media type acquisition method (bsc#1104353 bsc#1137201).\n- net: hns3: not reset TQP in the DOWN while VF resetting (bsc#1104353 bsc#1134952).\n- net: hns3: not reset vport who not alive when PF reset (bsc#1104353 bsc#1137201).\n- net: hns3: optimize the barrier using when cleaning TX BD (bsc#1104353 bsc#1134945).\n- net: hns3: prevent change MTU when resetting (bsc#1104353 bsc#1137201).\n- net: hns3: prevent double free in hns3_put_ring_config() (bsc#1104353 bsc#1134950).\n- net: hns3: reduce resources use in kdump kernel (bsc#1104353 bsc#1137201).\n- net: hns3: refactor BD filling for l2l3l4 info (bsc#1104353 bsc#1134947).\n- net: hns3: refine tx timeout count handle (bsc#1104353 bsc#1134990).\n- net: hns3: remove reset after command send failed (bsc#1104353 bsc#1134949).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net: hns3: return 0 and print warning when hit duplicate MAC (bsc#1104353 bsc#1137201).\n- net: hns3: set dividual reset level for all RAS and MSI-X errors (bsc#1104353 bsc#1135046).\n- net: hns3: set up the vport alive state while reinitializing (bsc#1104353 bsc#1137201).\n- net: hns3: set vport alive state to default while resetting (bsc#1104353 bsc#1137201).\n- net: hns3: some cleanup for struct hns3_enet_ring (bsc#1104353 bsc#1134947).\n- net: hns3: stop mailbox handling when command queue need re-init (bsc#1104353 bsc#1135058).\n- net: hns3: stop sending keep alive msg when VF command queue needs reinit (bsc#1104353 bsc#1134972).\n- net: hns3: unify maybe_stop_tx for TSO and non-TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: unify the page reusing for page size 4K and 64K (bsc#1104353 bsc#1134947).\n- net: hns3: use atomic_t replace u32 for arq\u0027s count (bsc#1104353 bsc#1134953).\n- net: hns3: use devm_kcalloc when allocating desc_cb (bsc#1104353 bsc#1134947).\n- net: hns3: use napi_schedule_irqoff in hard interrupts handlers (bsc#1104353 bsc#1134947).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113 FATE#326472).\n- net: phy: marvell: Enable interrupt function on LED2 pin (bsc#1135018).\n- net: phy: marvell: add new default led configure for m88e151x (bsc#1135018).\n- net: phy: marvell: change default m88e1510 LED configuration (bsc#1135018).\n- net: smc_close: mark expected switch fall-through (bsc#1096003, FATE#325023, LTC#164003).\n- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).\n- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).\n- nfs: Fix dentry revalidation on nfsv4 lookup (bsc#1132618).\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nl80211: fix station_info pertid memory leak (bsc#1051510).\n- nvme-fc: use separate work queue to avoid warning (bsc#1131673).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1130937).\n- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).\n- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: add proper discard setup for the multipath device (bsc#1114638).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvme: fix the dangerous reference of namespaces list (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- nvme: make sure ns head inherits underlying device limits (bsc#1131673).\n- nvme: only reconfigure discard if necessary (bsc#1114638).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- nvmem: Don\u0027t let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).\n- openvswitch: add seqadj extension when NAT is used (bsc#1051510).\n- openvswitch: fix flow actions reallocation (bsc#1051510).\n- overflow: Fix -Wtype-limits compilation warnings (bsc#1111666).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).\n- pci/aer: Use cached AER Capability offset (bsc#1142623).\n- pci/p2pdma: Fix missing check for dma_virt_ops (bsc#1111666).\n- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- pci/portdrv: Consolidate comments (bsc#1142623).\n- pci/portdrv: Disable port driver in compat mode (bsc#1142623).\n- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).\n- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- pci: Init PCIe feature bits for managed host bridge alloc (bsc#1111666).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: pciehp: Convert to threaded IRQ (bsc#1133005).\n- pci: pciehp: Ignore Link State Changes after powering off a slot (bsc#1133005).\n- pci: pciehp: Tolerate Presence Detect hardwired to zero (bsc#1133016).\n- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).\n- perf/x86/amd: Add event map for AMD Family 17h (bsc#1134223).\n- perf/x86/amd: Update generic hardware cache events for Family 17h (bsc#1134223).\n- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).\n- phy: sun4i-usb: Support set_mode to USB_HOST for non-OTG PHYs (bsc#1051510).\n- pinctrl/amd: add get_direction handler (bsc#1140463).\n- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).\n- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).\n- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).\n- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).\n- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).\n- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).\n- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).\n- platform/x86: intel_punit_ipc: Revert \u0027Fix resource ioremap warning\u0027 (bsc#1051510).\n- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).\n- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).\n- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).\n- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).\n- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).\n- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).\n- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).\n- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).\n- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).\n- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).\n- platform/x86: mlx-platform: Remove unused define (bsc#1112374).\n- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).\n- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).\n- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).\n- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).\n- pm: acpi/PCI: Resume all devices during hibernation (bsc#1111666).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- powerpc/64s: Fix logic when handling unknown CPU features (bsc#1055117).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc/hugetlb: Handle mmap_min_addr correctly in get_unmapped_area callback (bsc#1131900).\n- powerpc/kvm: Save and restore host AMR/IAMR/UAMOR (bsc#1061840).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, fate#323286, git-fixes).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, fate#323286, git-fixes).\n- powerpc/mm: Add missing tracepoint for tlbie (bsc#1055117, git-fixes).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Check secondary hash page table (bsc#1065729).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, fate#323286, git-fixes).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).\n- powerpc/numa: improve control of topology updates (bsc#1133584).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).\n- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).\n- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1055121).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/powernv/ioda2: Remove redundant free of TCE pages (bsc#1061840).\n- powerpc/powernv/ioda: Allocate indirect TCE levels of cached userspace addresses on demand (bsc#1061840).\n- powerpc/powernv/ioda: Fix locked_vm counting for memory used by IOMMU tables (bsc#1061840).\n- powerpc/powernv: Don\u0027t reprogram SLW image on every KVM guest entry/exit (bsc#1061840).\n- powerpc/powernv: Make opal log only readable by root (bsc#1065729).\n- powerpc/powernv: Remove never used pnv_power9_force_smt4 (bsc#1061840).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- powerpc/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).\n- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc64/ftrace: Include ftrace.h needed for enable/disable calls (bsc#1088804, git-fixes).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc: Fix 32-bit KVM-PR lockup and host crash with MacOS guest (bsc#1061840).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc: avoid -mno-sched-epilog on GCC 4.9 and newer (bsc#1065729).\n- powerpc: consolidate -mno-sched-epilog into FTRACE flags (bsc#1065729).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- proc/kcore: don\u0027t bounds check against address 0 (bsc#1051510).\n- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).\n- proc: revalidate kernel thread inodes to root:root (bsc#1051510).\n- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).\n- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).\n- pwm: meson: Don\u0027t disable PWM when setting duty repeatedly (bsc#1051510).\n- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).\n- pwm: stm32: Use 3 cells of_xlate() (bsc#1111666).\n- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128971).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).\n- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).\n- qla2xxx: kABI fixes for v10.00.00.14-k (bsc#1136215).\n- qla2xxx: kABI fixes for v10.01.00.15-k (bsc#1136215).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qlcnic: remove assumption that vlan_tci != 0 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027cur_rings, max_hw_rings, tx_desc_info\u0027 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027op, cmd_op\u0027 (bsc#1136469 jsc#SLE-4695).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- qmi_wwan: add Olicard 600 (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rdma/cxbg: Use correct sizing on buffers holding page DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Add support for 64Byte cqes (bsc#1127371).\n- rdma/cxgb4: Add support for kernel mode SRQ\u0027s (bsc#1127371).\n- rdma/cxgb4: Add support for srq functions and structs (bsc#1127371).\n- rdma/cxgb4: Don\u0027t expose DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Fix null pointer dereference on alloc_skb failure (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Fix spelling mistake \u0027immedate\u0027 \u0027immediate\u0027 (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Make c4iw_poll_cq_one() easier to analyze (bsc#1127371).\n- rdma/cxgb4: Remove a set-but-not-used variable (bsc#1127371).\n- rdma/cxgb4: Remove kref accounting for sync operation (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: fix some info leaks (bsc#1127371).\n- rdma/hns: Add SCC context allocation support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add SCC context clr support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add constraint on the setting of local ACK timeout (bsc#1104427 bsc#1137233).\n- rdma/hns: Add the process of AEQ overflow for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add timer allocation support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Bugfix for SCC hem free (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for mapping user db (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for posting multiple srq work request (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for sending with invalidate (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for set hem of SCC (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for the scene without receiver queue (bsc#1104427 bsc#1137233).\n- rdma/hns: Configure capacity of hns device (bsc#1104427 bsc#1137236).\n- rdma/hns: Delete useful prints for aeq subtype event (bsc#1104427 bsc#1126206).\n- rdma/hns: Fix the Oops during rmmod or insmod ko when reset occurs (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the bug with updating rq head pointer when flush cqe (bsc#1104427 bsc#1137233).\n- rdma/hns: Fix the chip hanging caused by sending doorbell during reset (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the chip hanging caused by sending mailbox CMQ during reset (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the state of rereg mr (bsc#1104427 bsc#1137236).\n- rdma/hns: Hide error print information with roce vf device (bsc#1104427 bsc#1137236).\n- rdma/hns: Limit minimum ROCE CQ depth to 64 (bsc#1104427 bsc#1137236).\n- rdma/hns: Make some function static (bsc#1104427 bsc#1126206).\n- rdma/hns: Modify qp specification according to UM (bsc#1104427 bsc#1137233).\n- rdma/hns: Modify the pbl ba page size for hip08 (bsc#1104427 bsc#1137233).\n- rdma/hns: Move spin_lock_irqsave to the correct place (bsc#1104427 bsc#1137236).\n- rdma/hns: Remove jiffies operation in disable interrupt context (bsc#1104427 bsc#1137236).\n- rdma/hns: Remove set but not used variable \u0027rst\u0027 (bsc#1104427 bsc#1126206).\n- rdma/hns: Set allocated memory to zero for wrid (bsc#1104427 bsc#1137236).\n- rdma/hns: Update CQE specifications (bsc#1104427 bsc#1137236).\n- rdma/hns: rdma/hns: Assign rq head pointer when enable rq record db (bsc#1104427 bsc#1137236).\n- rdma/iw_cxgb4: Always disconnect when QP is transitioning to TERMINATE state (bsc#1136348 jsc#SLE-4684).\n- rdma/iw_cxgb4: Drop __GFP_NOFAIL (bsc#1127371).\n- rdma/iwcm: add tos_set bool to iw_cm struct (bsc#1136348 jsc#SLE-4684).\n- rdma/qedr: Fix incorrect device rate (bsc#1136188).\n- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1136456 jsc#SLE-4689).\n- rdma/smc: Replace ib_query_gid with rdma_get_gid_attr (bsc#1131530 LTC#176717).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).\n- ring-buffer: Check if memory is available before allocation (bsc#1132531).\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: don\u0027t reference bogus function pointer in kdoc (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rtlwifi: fix potential NULL pointer dereference (bsc#1111666).\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).\n- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/airq: recognize directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/dasd: fix panic for failed online processing (bsc#1132589).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: fix assignment of bus resources (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: fix struct definition for set PCI function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: provide support for MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: remove stale rc (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: remove unused define (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pkey: move pckmo subfunction available checks away from module init (bsc#1128544).\n- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/sclp: detect DIRQ facility (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- s390/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178). \n- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- s390: enable processes for mio instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: show statistics for MSI IRQs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (bsc#1051510).\n- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).\n- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: fix spelling mistake \u0027Retreiving\u0027 \u0027Retrieving\u0027 (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: csiostor: Remove set but not used variable \u0027pln\u0027 (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst atid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi: hisi: KABI ignore new symbols (bsc#1135038).\n- scsi: hisi_sas: Add softreset in hisi_sas_I_T_nexus_reset() (bsc#1135033).\n- scsi: hisi_sas: Adjust the printk format of functions hisi_sas_init_device() (bsc#1135037).\n- scsi: hisi_sas: Do not fail IT nexus reset for Open Reject timeout (bsc#1135033).\n- scsi: hisi_sas: Do not hard reset disk during controller reset (bsc#1135034).\n- scsi: hisi_sas: Fix for setting the PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Remedy inconsistent PHY down state in software (bsc#1135039).\n- scsi: hisi_sas: Send HARD RESET to clear the previous affiliation of STP target port (bsc#1135037).\n- scsi: hisi_sas: Set PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Some misc tidy-up (bsc#1135031).\n- scsi: hisi_sas: Support all RAS events with MSI interrupts (bsc#1135035).\n- scsi: hisi_sas: add host reset interface for test (bsc#1135041).\n- scsi: hisi_sas: allocate different SAS address for directly attached situation (bsc#1135036).\n- scsi: hisi_sas: remove the check of sas_dev status in hisi_sas_I_T_nexus_reset() (bsc#1135037).\n- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: libsas: Do discovery on empty PHY to update PHY info (bsc#1135024).\n- scsi: libsas: Improve vague log in SAS rediscovery (bsc#1135027).\n- scsi: libsas: Inject revalidate event for root port event (bsc#1135026).\n- scsi: libsas: Print expander PHY indexes in decimal (bsc#1135021).\n- scsi: libsas: Stop hardcoding SAS address length (bsc#1135029).\n- scsi: libsas: Support SATA PHY connection rate unmatch fixing during discovery (bsc#1135028).\n- scsi: libsas: Try to retain programmed min linkrate for SATA min pathway unmatch fixing (bsc#1135028).\n- scsi: libsas: allocate sense buffer for bsg queue (bsc#1131467).\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).\n- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).\n- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).\n- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).\n- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).\n- scsi: megaraid_sas: correct an info message (bsc#1136271).\n- scsi: megaraid_sas: driver version update (bsc#1136271).\n- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for ATLAS PCIe switch (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add additional checks for io_req sc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1136215).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1136215).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1136215).\n- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1136215).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1136215).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1136215).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1136215).\n- scsi: qla2xxx: Avoid pci IRQ affinity mapping when multiqueue is not supported (bsc#1136215).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1136215).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1136215).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1136215).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1136215).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1136215).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1136215).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1136215).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1136215).\n- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1136215).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1136215).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1136215).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1136215).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1136215).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1136215).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1136215).\n- scsi: qla2xxx: Remove FW default template (bsc#1136215).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1136215).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1136215).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1136215).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1136215).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1136215).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1136215).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: qla2xxx: avoid printf format warning (bsc#1136215).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1136215).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 - \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1136215).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1136215).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- scsi: smartpqi: Add retries for device reset (bsc#1133547).\n- scsi: smartpqi: Reporting \u0027logical unit failure\u0027 (bsc#1133547).\n- scsi: smartpqi: add H3C controller IDs (bsc#1133547).\n- scsi: smartpqi: add h3c ssid (bsc#1133547).\n- scsi: smartpqi: add no_write_same for logical volumes (bsc#1133547).\n- scsi: smartpqi: add ofa support (bsc#1133547).\n- scsi: smartpqi: add smp_utils support (bsc#1133547).\n- scsi: smartpqi: add spdx (bsc#1133547).\n- scsi: smartpqi: add support for PQI Config Table handshake (bsc#1133547).\n- scsi: smartpqi: add support for huawei controllers (bsc#1133547).\n- scsi: smartpqi: add sysfs attributes (bsc#1133547).\n- scsi: smartpqi: allow for larger raid maps (bsc#1133547).\n- scsi: smartpqi: bump driver version (bsc#1133547).\n- scsi: smartpqi: bump driver version (bsc#1133547).\n- scsi: smartpqi: call pqi_free_interrupts() in pqi_shutdown() (bsc#1133547).\n- scsi: smartpqi: check for null device pointers (bsc#1133547).\n- scsi: smartpqi: correct host serial num for ssa (bsc#1133547).\n- scsi: smartpqi: correct lun reset issues (bsc#1133547).\n- scsi: smartpqi: correct volume status (bsc#1133547).\n- scsi: smartpqi: do not offline disks for transient did no connect conditions (bsc#1133547).\n- scsi: smartpqi: enhance numa node detection (bsc#1133547).\n- scsi: smartpqi: fix build warnings (bsc#1133547).\n- scsi: smartpqi: fix disk name mount point (bsc#1133547).\n- scsi: smartpqi: fully convert to the generic DMA API (bsc#1133547).\n- scsi: smartpqi: increase LUN reset timeout (bsc#1133547).\n- scsi: smartpqi: increase fw status register read timeout (bsc#1133547).\n- scsi: smartpqi: refactor sending controller raid requests (bsc#1133547).\n- scsi: smartpqi: turn off lun data caching for ptraid (bsc#1133547).\n- scsi: smartpqi: update copyright (bsc#1133547).\n- scsi: smartpqi: update driver version (bsc#1133547).\n- scsi: smartpqi: wake up drives after os resumes from suspend (bsc#1133547).\n- scsi: smartpqi_init: fix boolean expression in pqi_device_remove_start (bsc#1133547).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).\n- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).\n- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bsc#1051510).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- soc/tegra: fuse: Fix illegal free of IO base address (bsc#1051510).\n- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi-mem: fix kernel-doc for spi_mem_dirmap_{read|write}() (bsc#1111666).\n- spi: Add missing pm_runtime_put_noidle() after failed get (bsc#1111666).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).\n- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).\n- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).\n- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging: comedi: ni_usb6501: Fix possible double-free of usb_rx_buf (bsc#1051510).\n- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bsc#1051510).\n- staging: comedi: vmk80xx: Fix possible double-free of usb_rx_buf (bsc#1051510).\n- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bsc#1051510).\n- staging: iio: ad7192: Fix ad7193 channel address (bsc#1051510).\n- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- staging: rtl8712: uninitialized memory in read_bbreg_hdl() (bsc#1051510).\n- staging: rtlwifi: Fix potential NULL pointer dereference of kzalloc (bsc#1111666).\n- staging: rtlwifi: rtl8822b: fix to avoid potential NULL pointer dereference (bsc#1111666).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: vt6655: Fix interrupt race condition on device start up (bsc#1051510). \n- staging: vt6655: Remove vif check from vnt_interrupt (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- stm class: Fix an endless loop in channel allocation (bsc#1051510).\n- stm class: Fix channel free in stm output free path (bsc#1051510).\n- stm class: Prevent division by zero (bsc#1051510).\n- supported.conf: Add cls_bpf, sch_ingress to kernel-default-base (bsc#1134743).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)\n- supported.conf: dw_mmc-bluefield is not needed in kernel-default-base (bsc#1131574).\n- svm/avic: Fix invalidate logical APIC id entry (bsc#1132726).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC DFR and LDR handling (bsc#1132558).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow for file-max (bsc#1051510).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- team: Always enable vlan tx offload (bsc#1051510).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- testing: nvdimm: provide SZ_4G constant (bsc#1132982).\n- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).\n- thermal/int340x_thermal: fix mode setting (bsc#1051510).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: fix infinite loop in map create (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1082555).\n- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bsc#1132527).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tracing: Fix a memory leak by early error exit in trace_pid_write() (bsc#1133702).\n- tracing: Fix buffer_ref pipe ops (bsc#1133698).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty: serial_core, add install (bnc#1129693).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).\n- usb: chipidea: Grab the (legacy) USB PHY by phandle first (bsc#1051510).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).\n- usb: f_fs: Avoid crash due to out-of-scope stack ptr access (bsc#1051510).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300 ep[i] (bsc#1051510).\n- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: u132-hcd: fix resource leak (bsc#1051510).\n- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).\n- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).\n- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).\n- vfio/pci: use correct format characters (bsc#1051510).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).\n- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).\n- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).\n- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).\n- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).\n- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).\n- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).\n- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).\n- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).\n- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).\n- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).\n- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).\n- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).\n- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).\n- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).\n- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).\n- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).\n- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).\n- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).\n- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).\n- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).\n- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).\n- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).\n- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio: Honour \u0027may_reduce_num\u0027 in vring_create_virtqueue (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).\n- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).\n- vsock/virtio: reset connected sockets on device removal (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: check null pointer in _wil_cfg80211_merge_extra_ies (bsc#1051510).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix return code of wmi_mgmt_tx and wmi_mgmt_tx_ext (bsc#1111666).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86/CPU/AMD: Don\u0027t force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/MCE/AMD, EDAC/mce_amd: Add new MP5, NBIO, and pciE SMCA bank types (bsc#1128415).\n- x86/MCE/AMD, EDAC/mce_amd: Add new McaTypes for CS, PSP, and SMU units (bsc#1128415).\n- x86/MCE/AMD, EDAC/mce_amd: Add new error descriptions for some SMCA bank types (bsc#1128415).\n- x86/MCE: Fix kABI for new AMD bank names (bsc#1128415).\n- x86/PCI: Fixup RTIT_BAR of Intel Denverton Trace Hub (bsc#1120318). \n- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).\n- x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init (bsc#1132572).\n- x86/mce/AMD, EDAC/mce_amd: Enumerate Reserved SMCA bank type (bsc#1128415).\n- x86/mce/AMD: Pass the bank number to smca_get_bank_type() (bsc#1128415).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/mce: Handle varying MCA bank counts (bsc#1128415).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/msr-index: Cleanup bit defines (bsc#1111331).\n- x86/perf/amd: Remove need to check \u0027running\u0027 bit in NMI handler (bsc#1131438).\n- x86/perf/amd: Resolve NMI latency issues for active PMCs (bsc#1131438).\n- x86/perf/amd: Resolve race condition when disabling PMC (bsc#1131438).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).\n- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).\n- x86/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- x86/tsc: Force inlining of cyc2ns bits (bsc#1052904).\n- x86/umip: Make the UMIP activated message generic (bsc#1138336).\n- x86/umip: Print UMIP line only once (bsc#1138336).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xdp: check device pointer before clearing (bsc#1109837).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen/pciback: Don\u0027t disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xen: Prevent buffer overflow in privcmd ioctl (bsc#1065600).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: add the ability to join a held buffer to a defer_ops (bsc#1133674).\n- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).\n- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).\n- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).\n- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).\n- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).\n- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: detect and fix bad summary counts at mount (bsc#1114427).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: don\u0027t clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: don\u0027t look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: don\u0027t use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: don\u0027t use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).\n- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).\n- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).\n- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).\n- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).\n- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).\n- xfs: fix reporting supported extra file attributes for statx() (bsc#1133529).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).\n- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: hold xfs_buf locked between shortform leaf conversion and the addition of an attribute (bsc#1133675).\n- xfs: kill meaningless variable \u0027zero\u0027 (bsc#1106011).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).\n- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).\n- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).\n- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).\n- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: refactor xfs_trans_roll (bsc#1133667).\n- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).\n- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).\n- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).\n- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove dest file\u0027s post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).\n- xfs: remove dest file\u0027s post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove the ip argument to xfs_defer_finish (bsc#1133672).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: remove xfs_zero_range (bsc#1106011).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: rename xfs_defer_join to xfs_defer_ijoin (bsc#1133668).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).\n- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).\n- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 FATE#326009).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2430,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2430,SUSE-SLE-Module-RT-15-SP1-2019-2430", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2430-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2430-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2430-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" }, { "category": "self", "summary": "SUSE Bug 1050242", "url": "https://bugzilla.suse.com/1050242" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1052904", "url": "https://bugzilla.suse.com/1052904" }, { "category": "self", "summary": "SUSE Bug 1053043", "url": "https://bugzilla.suse.com/1053043" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1070872", "url": "https://bugzilla.suse.com/1070872" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1075020", "url": "https://bugzilla.suse.com/1075020" }, { "category": "self", "summary": "SUSE Bug 1082387", "url": "https://bugzilla.suse.com/1082387" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1085535", "url": "https://bugzilla.suse.com/1085535" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1088804", "url": "https://bugzilla.suse.com/1088804" }, { "category": "self", "summary": "SUSE Bug 1093389", "url": "https://bugzilla.suse.com/1093389" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1096003", "url": "https://bugzilla.suse.com/1096003" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1099658", "url": "https://bugzilla.suse.com/1099658" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1103186", "url": "https://bugzilla.suse.com/1103186" }, { "category": "self", "summary": "SUSE Bug 1103259", "url": "https://bugzilla.suse.com/1103259" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1106011", "url": "https://bugzilla.suse.com/1106011" }, { "category": "self", "summary": "SUSE Bug 1106284", "url": "https://bugzilla.suse.com/1106284" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1106751", "url": "https://bugzilla.suse.com/1106751" }, { "category": "self", "summary": "SUSE Bug 1108193", "url": "https://bugzilla.suse.com/1108193" }, { "category": "self", "summary": "SUSE Bug 1108838", "url": "https://bugzilla.suse.com/1108838" }, { "category": "self", "summary": "SUSE Bug 1108937", "url": "https://bugzilla.suse.com/1108937" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1110946", "url": "https://bugzilla.suse.com/1110946" }, { "category": "self", "summary": "SUSE Bug 1111331", "url": "https://bugzilla.suse.com/1111331" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1111696", "url": "https://bugzilla.suse.com/1111696" }, { "category": "self", "summary": "SUSE Bug 1112063", "url": "https://bugzilla.suse.com/1112063" }, { "category": "self", "summary": "SUSE Bug 1112128", "url": "https://bugzilla.suse.com/1112128" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114427", "url": "https://bugzilla.suse.com/1114427" }, { "category": "self", "summary": "SUSE Bug 1114542", "url": "https://bugzilla.suse.com/1114542" }, { "category": "self", "summary": "SUSE Bug 1114638", "url": "https://bugzilla.suse.com/1114638" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1115688", "url": "https://bugzilla.suse.com/1115688" }, { "category": "self", "summary": "SUSE Bug 1117114", "url": "https://bugzilla.suse.com/1117114" }, { "category": "self", "summary": "SUSE Bug 1117158", "url": "https://bugzilla.suse.com/1117158" }, { "category": "self", "summary": "SUSE Bug 1117561", "url": "https://bugzilla.suse.com/1117561" }, { "category": "self", "summary": "SUSE Bug 1118139", "url": "https://bugzilla.suse.com/1118139" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1119680", "url": "https://bugzilla.suse.com/1119680" }, { "category": "self", "summary": "SUSE Bug 1120091", "url": "https://bugzilla.suse.com/1120091" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1120566", "url": "https://bugzilla.suse.com/1120566" }, { "category": "self", "summary": "SUSE Bug 1120843", "url": "https://bugzilla.suse.com/1120843" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1122767", "url": "https://bugzilla.suse.com/1122767" }, { "category": "self", "summary": "SUSE Bug 1122776", "url": "https://bugzilla.suse.com/1122776" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1123454", "url": "https://bugzilla.suse.com/1123454" }, { "category": "self", "summary": "SUSE Bug 1123663", "url": "https://bugzilla.suse.com/1123663" }, { "category": "self", "summary": "SUSE Bug 1124503", "url": "https://bugzilla.suse.com/1124503" }, { "category": "self", "summary": "SUSE Bug 1124839", "url": "https://bugzilla.suse.com/1124839" }, { "category": "self", "summary": "SUSE Bug 1125703", "url": "https://bugzilla.suse.com/1125703" }, { "category": "self", "summary": "SUSE Bug 1126206", "url": "https://bugzilla.suse.com/1126206" }, { "category": "self", "summary": "SUSE Bug 1126356", "url": "https://bugzilla.suse.com/1126356" }, { "category": "self", "summary": "SUSE Bug 1126704", "url": "https://bugzilla.suse.com/1126704" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127175", "url": "https://bugzilla.suse.com/1127175" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1127374", "url": "https://bugzilla.suse.com/1127374" }, { "category": "self", "summary": "SUSE Bug 1127611", "url": "https://bugzilla.suse.com/1127611" }, { "category": "self", "summary": "SUSE Bug 1127616", "url": "https://bugzilla.suse.com/1127616" }, { "category": "self", "summary": "SUSE Bug 1128052", "url": "https://bugzilla.suse.com/1128052" }, { "category": "self", "summary": "SUSE Bug 1128415", "url": "https://bugzilla.suse.com/1128415" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128544", "url": "https://bugzilla.suse.com/1128544" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1128904", "url": "https://bugzilla.suse.com/1128904" }, { "category": "self", "summary": "SUSE Bug 1128971", "url": "https://bugzilla.suse.com/1128971" }, { "category": "self", "summary": "SUSE Bug 1128979", "url": "https://bugzilla.suse.com/1128979" }, { "category": "self", "summary": "SUSE Bug 1129138", "url": "https://bugzilla.suse.com/1129138" }, { "category": "self", "summary": "SUSE Bug 1129273", "url": "https://bugzilla.suse.com/1129273" }, { "category": "self", "summary": "SUSE Bug 1129693", "url": "https://bugzilla.suse.com/1129693" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1129845", "url": "https://bugzilla.suse.com/1129845" }, { "category": "self", "summary": "SUSE Bug 1130195", "url": "https://bugzilla.suse.com/1130195" }, { "category": "self", "summary": "SUSE Bug 1130425", "url": "https://bugzilla.suse.com/1130425" }, { "category": "self", "summary": "SUSE Bug 1130527", "url": "https://bugzilla.suse.com/1130527" }, { "category": "self", "summary": "SUSE Bug 1130567", "url": "https://bugzilla.suse.com/1130567" }, { "category": "self", "summary": "SUSE Bug 1130579", "url": "https://bugzilla.suse.com/1130579" }, { "category": "self", "summary": "SUSE Bug 1130699", "url": "https://bugzilla.suse.com/1130699" }, { "category": "self", "summary": "SUSE Bug 1130836", "url": "https://bugzilla.suse.com/1130836" }, { "category": "self", "summary": "SUSE Bug 1130937", "url": "https://bugzilla.suse.com/1130937" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1131326", "url": "https://bugzilla.suse.com/1131326" }, { "category": "self", "summary": "SUSE Bug 1131427", "url": "https://bugzilla.suse.com/1131427" }, { "category": "self", "summary": "SUSE Bug 1131438", "url": "https://bugzilla.suse.com/1131438" }, { "category": "self", "summary": "SUSE Bug 1131451", "url": "https://bugzilla.suse.com/1131451" }, { "category": "self", "summary": "SUSE Bug 1131467", "url": "https://bugzilla.suse.com/1131467" }, { "category": "self", "summary": "SUSE Bug 1131488", "url": "https://bugzilla.suse.com/1131488" }, { "category": "self", "summary": "SUSE Bug 1131530", "url": "https://bugzilla.suse.com/1131530" }, { "category": "self", "summary": "SUSE Bug 1131565", "url": "https://bugzilla.suse.com/1131565" }, { "category": "self", "summary": "SUSE Bug 1131574", "url": "https://bugzilla.suse.com/1131574" }, { "category": "self", "summary": "SUSE Bug 1131587", "url": "https://bugzilla.suse.com/1131587" }, { "category": "self", "summary": "SUSE Bug 1131645", "url": "https://bugzilla.suse.com/1131645" }, { "category": "self", "summary": "SUSE Bug 1131659", "url": "https://bugzilla.suse.com/1131659" }, { "category": "self", "summary": "SUSE Bug 1131673", "url": "https://bugzilla.suse.com/1131673" }, { "category": "self", "summary": "SUSE Bug 1131847", "url": "https://bugzilla.suse.com/1131847" }, { "category": "self", "summary": "SUSE Bug 1131848", "url": "https://bugzilla.suse.com/1131848" }, { "category": "self", "summary": "SUSE Bug 1131851", "url": "https://bugzilla.suse.com/1131851" }, { "category": "self", "summary": "SUSE Bug 1131900", "url": "https://bugzilla.suse.com/1131900" }, { "category": "self", "summary": "SUSE Bug 1131934", "url": "https://bugzilla.suse.com/1131934" }, { "category": "self", "summary": "SUSE Bug 1131935", "url": "https://bugzilla.suse.com/1131935" }, { "category": "self", "summary": "SUSE Bug 1132044", "url": "https://bugzilla.suse.com/1132044" }, { "category": "self", "summary": "SUSE Bug 1132219", "url": "https://bugzilla.suse.com/1132219" }, { "category": "self", "summary": "SUSE Bug 1132226", "url": "https://bugzilla.suse.com/1132226" }, { "category": "self", "summary": "SUSE Bug 1132227", "url": "https://bugzilla.suse.com/1132227" }, { "category": "self", "summary": "SUSE Bug 1132365", "url": "https://bugzilla.suse.com/1132365" }, { "category": "self", "summary": "SUSE Bug 1132368", "url": "https://bugzilla.suse.com/1132368" }, { "category": "self", "summary": "SUSE Bug 1132369", "url": "https://bugzilla.suse.com/1132369" }, { "category": "self", "summary": "SUSE Bug 1132370", "url": "https://bugzilla.suse.com/1132370" }, { "category": "self", "summary": "SUSE Bug 1132372", "url": "https://bugzilla.suse.com/1132372" }, { "category": "self", "summary": "SUSE Bug 1132373", "url": "https://bugzilla.suse.com/1132373" }, { "category": "self", "summary": "SUSE Bug 1132384", "url": "https://bugzilla.suse.com/1132384" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1132397", "url": "https://bugzilla.suse.com/1132397" }, { "category": "self", "summary": "SUSE Bug 1132402", "url": "https://bugzilla.suse.com/1132402" }, { "category": "self", "summary": "SUSE Bug 1132403", "url": "https://bugzilla.suse.com/1132403" }, { "category": "self", "summary": "SUSE Bug 1132404", "url": "https://bugzilla.suse.com/1132404" }, { "category": "self", "summary": "SUSE Bug 1132405", "url": "https://bugzilla.suse.com/1132405" }, { "category": "self", "summary": "SUSE Bug 1132407", "url": "https://bugzilla.suse.com/1132407" }, { "category": "self", "summary": "SUSE Bug 1132411", "url": "https://bugzilla.suse.com/1132411" }, { "category": "self", "summary": "SUSE Bug 1132412", "url": "https://bugzilla.suse.com/1132412" }, { "category": "self", "summary": "SUSE Bug 1132413", "url": "https://bugzilla.suse.com/1132413" }, { "category": "self", "summary": "SUSE Bug 1132414", "url": "https://bugzilla.suse.com/1132414" }, { "category": "self", "summary": "SUSE Bug 1132426", "url": "https://bugzilla.suse.com/1132426" }, { "category": "self", "summary": "SUSE Bug 1132527", "url": "https://bugzilla.suse.com/1132527" }, { "category": "self", "summary": "SUSE Bug 1132531", "url": "https://bugzilla.suse.com/1132531" }, { "category": "self", "summary": "SUSE Bug 1132555", "url": "https://bugzilla.suse.com/1132555" }, { "category": "self", "summary": "SUSE Bug 1132558", "url": "https://bugzilla.suse.com/1132558" }, { "category": "self", "summary": "SUSE Bug 1132561", "url": "https://bugzilla.suse.com/1132561" }, { "category": "self", "summary": "SUSE Bug 1132562", "url": "https://bugzilla.suse.com/1132562" }, { "category": "self", "summary": "SUSE Bug 1132563", "url": "https://bugzilla.suse.com/1132563" }, { "category": "self", "summary": "SUSE Bug 1132564", "url": "https://bugzilla.suse.com/1132564" }, { "category": "self", "summary": "SUSE Bug 1132570", "url": "https://bugzilla.suse.com/1132570" }, { "category": "self", "summary": "SUSE Bug 1132571", "url": "https://bugzilla.suse.com/1132571" }, { "category": "self", "summary": "SUSE Bug 1132572", "url": "https://bugzilla.suse.com/1132572" }, { "category": "self", "summary": "SUSE Bug 1132589", "url": "https://bugzilla.suse.com/1132589" }, { "category": "self", "summary": "SUSE Bug 1132618", "url": "https://bugzilla.suse.com/1132618" }, { "category": "self", "summary": "SUSE Bug 1132673", "url": "https://bugzilla.suse.com/1132673" }, { "category": "self", "summary": "SUSE Bug 1132681", "url": "https://bugzilla.suse.com/1132681" }, { "category": "self", "summary": "SUSE Bug 1132726", "url": "https://bugzilla.suse.com/1132726" }, { "category": "self", "summary": "SUSE Bug 1132828", "url": "https://bugzilla.suse.com/1132828" }, { "category": "self", "summary": "SUSE Bug 1132894", "url": "https://bugzilla.suse.com/1132894" }, { "category": "self", "summary": "SUSE Bug 1132943", "url": "https://bugzilla.suse.com/1132943" }, { "category": "self", "summary": "SUSE Bug 1132982", "url": "https://bugzilla.suse.com/1132982" }, { "category": "self", "summary": "SUSE Bug 1133005", "url": "https://bugzilla.suse.com/1133005" }, { "category": "self", "summary": "SUSE Bug 1133016", "url": "https://bugzilla.suse.com/1133016" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1133094", "url": "https://bugzilla.suse.com/1133094" }, { "category": "self", "summary": "SUSE Bug 1133095", "url": "https://bugzilla.suse.com/1133095" }, { "category": "self", "summary": "SUSE Bug 1133115", "url": "https://bugzilla.suse.com/1133115" }, { "category": "self", "summary": "SUSE Bug 1133149", "url": "https://bugzilla.suse.com/1133149" }, { "category": "self", "summary": "SUSE Bug 1133176", "url": "https://bugzilla.suse.com/1133176" }, { "category": "self", "summary": "SUSE Bug 1133188", "url": "https://bugzilla.suse.com/1133188" }, { "category": "self", "summary": "SUSE Bug 1133190", "url": "https://bugzilla.suse.com/1133190" }, { "category": "self", "summary": "SUSE Bug 1133311", "url": "https://bugzilla.suse.com/1133311" }, { "category": "self", "summary": "SUSE Bug 1133320", "url": "https://bugzilla.suse.com/1133320" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133486", "url": "https://bugzilla.suse.com/1133486" }, { "category": "self", "summary": "SUSE Bug 1133529", "url": "https://bugzilla.suse.com/1133529" }, { "category": "self", "summary": "SUSE Bug 1133547", "url": "https://bugzilla.suse.com/1133547" }, { "category": "self", "summary": "SUSE Bug 1133584", "url": "https://bugzilla.suse.com/1133584" }, { "category": "self", "summary": "SUSE Bug 1133593", "url": "https://bugzilla.suse.com/1133593" }, { "category": "self", "summary": "SUSE Bug 1133612", "url": "https://bugzilla.suse.com/1133612" }, { "category": "self", "summary": "SUSE Bug 1133616", "url": "https://bugzilla.suse.com/1133616" }, { "category": "self", "summary": "SUSE Bug 1133667", "url": "https://bugzilla.suse.com/1133667" }, { "category": "self", "summary": "SUSE Bug 1133668", "url": "https://bugzilla.suse.com/1133668" }, { "category": "self", "summary": "SUSE Bug 1133672", "url": "https://bugzilla.suse.com/1133672" }, { "category": "self", "summary": "SUSE Bug 1133674", "url": "https://bugzilla.suse.com/1133674" }, { "category": "self", "summary": "SUSE Bug 1133675", "url": "https://bugzilla.suse.com/1133675" }, { "category": "self", "summary": "SUSE Bug 1133698", "url": "https://bugzilla.suse.com/1133698" }, { "category": "self", "summary": "SUSE Bug 1133702", "url": "https://bugzilla.suse.com/1133702" }, { "category": "self", "summary": "SUSE Bug 1133731", "url": "https://bugzilla.suse.com/1133731" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1133769", "url": "https://bugzilla.suse.com/1133769" }, { "category": "self", "summary": "SUSE Bug 1133772", "url": "https://bugzilla.suse.com/1133772" }, { "category": "self", "summary": "SUSE Bug 1133774", "url": "https://bugzilla.suse.com/1133774" }, { "category": "self", "summary": "SUSE Bug 1133778", "url": "https://bugzilla.suse.com/1133778" }, { "category": "self", "summary": "SUSE Bug 1133779", "url": "https://bugzilla.suse.com/1133779" }, { "category": "self", "summary": "SUSE Bug 1133780", "url": "https://bugzilla.suse.com/1133780" }, { "category": "self", "summary": "SUSE Bug 1133825", "url": "https://bugzilla.suse.com/1133825" }, { "category": "self", "summary": "SUSE Bug 1133850", "url": "https://bugzilla.suse.com/1133850" }, { "category": "self", "summary": "SUSE Bug 1133851", "url": "https://bugzilla.suse.com/1133851" }, { "category": "self", "summary": "SUSE Bug 1133852", "url": "https://bugzilla.suse.com/1133852" }, { "category": "self", "summary": "SUSE Bug 1133897", "url": "https://bugzilla.suse.com/1133897" }, { "category": "self", "summary": "SUSE Bug 1134090", "url": "https://bugzilla.suse.com/1134090" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134160", "url": "https://bugzilla.suse.com/1134160" }, { "category": "self", "summary": "SUSE Bug 1134162", "url": "https://bugzilla.suse.com/1134162" }, { "category": "self", "summary": "SUSE Bug 1134199", "url": "https://bugzilla.suse.com/1134199" }, { "category": "self", "summary": "SUSE Bug 1134200", "url": "https://bugzilla.suse.com/1134200" }, { "category": "self", "summary": "SUSE Bug 1134201", "url": "https://bugzilla.suse.com/1134201" }, { "category": "self", "summary": "SUSE Bug 1134202", "url": "https://bugzilla.suse.com/1134202" }, { "category": "self", "summary": "SUSE Bug 1134203", "url": "https://bugzilla.suse.com/1134203" }, { "category": "self", "summary": "SUSE Bug 1134204", "url": "https://bugzilla.suse.com/1134204" }, { "category": "self", "summary": "SUSE Bug 1134205", "url": "https://bugzilla.suse.com/1134205" }, { "category": "self", "summary": "SUSE Bug 1134223", "url": "https://bugzilla.suse.com/1134223" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134354", "url": "https://bugzilla.suse.com/1134354" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134393", "url": "https://bugzilla.suse.com/1134393" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1134397", "url": "https://bugzilla.suse.com/1134397" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1134459", "url": "https://bugzilla.suse.com/1134459" }, { "category": "self", "summary": "SUSE Bug 1134460", "url": "https://bugzilla.suse.com/1134460" }, { "category": "self", "summary": "SUSE Bug 1134461", "url": "https://bugzilla.suse.com/1134461" }, { "category": "self", "summary": "SUSE Bug 1134597", "url": "https://bugzilla.suse.com/1134597" }, { "category": "self", "summary": "SUSE Bug 1134600", "url": "https://bugzilla.suse.com/1134600" }, { "category": "self", "summary": "SUSE Bug 1134607", "url": "https://bugzilla.suse.com/1134607" }, { "category": "self", "summary": "SUSE Bug 1134618", "url": "https://bugzilla.suse.com/1134618" }, { "category": "self", "summary": "SUSE Bug 1134651", "url": "https://bugzilla.suse.com/1134651" }, { "category": "self", "summary": "SUSE Bug 1134671", "url": "https://bugzilla.suse.com/1134671" }, { "category": "self", "summary": "SUSE Bug 1134730", "url": "https://bugzilla.suse.com/1134730" }, { "category": "self", "summary": "SUSE Bug 1134738", "url": "https://bugzilla.suse.com/1134738" }, { "category": "self", "summary": "SUSE Bug 1134743", "url": "https://bugzilla.suse.com/1134743" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1134806", "url": "https://bugzilla.suse.com/1134806" }, { "category": "self", "summary": "SUSE Bug 1134810", "url": "https://bugzilla.suse.com/1134810" }, { "category": "self", "summary": "SUSE Bug 1134813", "url": "https://bugzilla.suse.com/1134813" }, { "category": "self", "summary": "SUSE Bug 1134848", "url": "https://bugzilla.suse.com/1134848" }, { "category": "self", "summary": "SUSE Bug 1134936", "url": "https://bugzilla.suse.com/1134936" }, { "category": "self", "summary": "SUSE Bug 1134945", "url": "https://bugzilla.suse.com/1134945" }, { "category": "self", "summary": "SUSE Bug 1134946", "url": "https://bugzilla.suse.com/1134946" }, { "category": "self", "summary": "SUSE Bug 1134947", "url": "https://bugzilla.suse.com/1134947" }, { "category": "self", "summary": "SUSE Bug 1134948", "url": "https://bugzilla.suse.com/1134948" }, { "category": "self", "summary": "SUSE Bug 1134949", "url": "https://bugzilla.suse.com/1134949" }, { "category": "self", "summary": "SUSE Bug 1134950", "url": "https://bugzilla.suse.com/1134950" }, { "category": "self", "summary": "SUSE Bug 1134951", "url": "https://bugzilla.suse.com/1134951" }, { "category": "self", "summary": "SUSE Bug 1134952", "url": "https://bugzilla.suse.com/1134952" }, { "category": "self", "summary": "SUSE Bug 1134953", "url": "https://bugzilla.suse.com/1134953" }, { "category": "self", "summary": "SUSE Bug 1134972", "url": "https://bugzilla.suse.com/1134972" }, { "category": "self", "summary": "SUSE Bug 1134974", "url": "https://bugzilla.suse.com/1134974" }, { "category": "self", "summary": "SUSE Bug 1134975", "url": "https://bugzilla.suse.com/1134975" }, { "category": "self", "summary": "SUSE Bug 1134980", "url": "https://bugzilla.suse.com/1134980" }, { "category": "self", "summary": "SUSE Bug 1134981", "url": "https://bugzilla.suse.com/1134981" }, { "category": "self", "summary": "SUSE Bug 1134983", "url": "https://bugzilla.suse.com/1134983" }, { "category": "self", "summary": "SUSE Bug 1134987", "url": "https://bugzilla.suse.com/1134987" }, { "category": "self", "summary": "SUSE Bug 1134989", "url": "https://bugzilla.suse.com/1134989" }, { "category": "self", "summary": "SUSE Bug 1134990", "url": "https://bugzilla.suse.com/1134990" }, { "category": "self", "summary": "SUSE Bug 1134994", "url": "https://bugzilla.suse.com/1134994" }, { "category": "self", "summary": "SUSE Bug 1134995", "url": "https://bugzilla.suse.com/1134995" }, { "category": "self", "summary": "SUSE Bug 1134998", "url": "https://bugzilla.suse.com/1134998" }, { "category": "self", "summary": "SUSE Bug 1134999", "url": "https://bugzilla.suse.com/1134999" }, { "category": "self", "summary": "SUSE Bug 1135006", "url": "https://bugzilla.suse.com/1135006" }, { "category": "self", "summary": "SUSE Bug 1135007", "url": "https://bugzilla.suse.com/1135007" }, { "category": "self", "summary": "SUSE Bug 1135008", "url": "https://bugzilla.suse.com/1135008" }, { "category": "self", "summary": "SUSE Bug 1135018", "url": "https://bugzilla.suse.com/1135018" }, { "category": "self", "summary": "SUSE Bug 1135021", "url": "https://bugzilla.suse.com/1135021" }, { "category": "self", "summary": "SUSE Bug 1135024", "url": "https://bugzilla.suse.com/1135024" }, { "category": "self", "summary": "SUSE Bug 1135026", "url": "https://bugzilla.suse.com/1135026" }, { "category": "self", "summary": "SUSE Bug 1135027", "url": "https://bugzilla.suse.com/1135027" }, { "category": "self", "summary": "SUSE Bug 1135028", "url": "https://bugzilla.suse.com/1135028" }, { "category": "self", "summary": "SUSE Bug 1135029", "url": "https://bugzilla.suse.com/1135029" }, { "category": "self", "summary": "SUSE Bug 1135031", "url": "https://bugzilla.suse.com/1135031" }, { "category": "self", "summary": "SUSE Bug 1135033", "url": "https://bugzilla.suse.com/1135033" }, { "category": "self", "summary": "SUSE Bug 1135034", "url": "https://bugzilla.suse.com/1135034" }, { "category": "self", "summary": "SUSE Bug 1135035", "url": "https://bugzilla.suse.com/1135035" }, { "category": "self", "summary": "SUSE Bug 1135036", "url": "https://bugzilla.suse.com/1135036" }, { "category": "self", "summary": "SUSE Bug 1135037", "url": "https://bugzilla.suse.com/1135037" }, { "category": "self", "summary": "SUSE Bug 1135038", "url": "https://bugzilla.suse.com/1135038" }, { "category": "self", "summary": "SUSE Bug 1135039", "url": "https://bugzilla.suse.com/1135039" }, { "category": "self", "summary": "SUSE Bug 1135041", "url": "https://bugzilla.suse.com/1135041" }, { "category": "self", "summary": "SUSE Bug 1135042", "url": "https://bugzilla.suse.com/1135042" }, { "category": "self", "summary": "SUSE Bug 1135044", "url": "https://bugzilla.suse.com/1135044" }, { "category": "self", "summary": "SUSE Bug 1135045", "url": "https://bugzilla.suse.com/1135045" }, { "category": "self", "summary": "SUSE Bug 1135046", "url": "https://bugzilla.suse.com/1135046" }, { "category": "self", "summary": "SUSE Bug 1135047", "url": "https://bugzilla.suse.com/1135047" }, { "category": "self", "summary": "SUSE Bug 1135049", "url": "https://bugzilla.suse.com/1135049" }, { "category": "self", "summary": "SUSE Bug 1135051", "url": "https://bugzilla.suse.com/1135051" }, { "category": "self", "summary": "SUSE Bug 1135052", "url": "https://bugzilla.suse.com/1135052" }, { "category": "self", "summary": "SUSE Bug 1135053", "url": "https://bugzilla.suse.com/1135053" }, { "category": "self", "summary": "SUSE Bug 1135055", "url": "https://bugzilla.suse.com/1135055" }, { "category": "self", "summary": "SUSE Bug 1135056", "url": "https://bugzilla.suse.com/1135056" }, { "category": "self", "summary": "SUSE Bug 1135058", "url": "https://bugzilla.suse.com/1135058" }, { "category": "self", "summary": "SUSE Bug 1135100", "url": "https://bugzilla.suse.com/1135100" }, { "category": "self", "summary": "SUSE Bug 1135120", "url": "https://bugzilla.suse.com/1135120" }, { "category": "self", "summary": "SUSE Bug 1135153", "url": "https://bugzilla.suse.com/1135153" }, { "category": "self", "summary": "SUSE Bug 1135278", "url": "https://bugzilla.suse.com/1135278" }, { "category": "self", "summary": "SUSE Bug 1135281", "url": "https://bugzilla.suse.com/1135281" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135309", "url": "https://bugzilla.suse.com/1135309" }, { "category": "self", "summary": "SUSE Bug 1135312", "url": "https://bugzilla.suse.com/1135312" }, { "category": "self", "summary": "SUSE Bug 1135314", "url": "https://bugzilla.suse.com/1135314" }, { "category": "self", "summary": "SUSE Bug 1135315", "url": "https://bugzilla.suse.com/1135315" }, { "category": "self", "summary": "SUSE Bug 1135316", "url": "https://bugzilla.suse.com/1135316" }, { "category": "self", "summary": "SUSE Bug 1135320", "url": "https://bugzilla.suse.com/1135320" }, { "category": "self", "summary": "SUSE Bug 1135323", "url": "https://bugzilla.suse.com/1135323" }, { "category": "self", "summary": "SUSE Bug 1135330", "url": "https://bugzilla.suse.com/1135330" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135492", "url": "https://bugzilla.suse.com/1135492" }, { "category": "self", "summary": "SUSE Bug 1135542", "url": "https://bugzilla.suse.com/1135542" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135603", "url": "https://bugzilla.suse.com/1135603" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135661", "url": "https://bugzilla.suse.com/1135661" }, { "category": "self", "summary": "SUSE Bug 1135758", "url": "https://bugzilla.suse.com/1135758" }, { "category": "self", "summary": "SUSE Bug 1135897", "url": "https://bugzilla.suse.com/1135897" }, { "category": "self", "summary": "SUSE Bug 1136156", "url": "https://bugzilla.suse.com/1136156" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136161", "url": "https://bugzilla.suse.com/1136161" }, { "category": "self", "summary": "SUSE Bug 1136188", "url": "https://bugzilla.suse.com/1136188" }, { "category": "self", "summary": "SUSE Bug 1136206", "url": "https://bugzilla.suse.com/1136206" }, { "category": "self", "summary": "SUSE Bug 1136215", "url": "https://bugzilla.suse.com/1136215" }, { "category": "self", "summary": "SUSE Bug 1136217", "url": "https://bugzilla.suse.com/1136217" }, { "category": "self", "summary": "SUSE Bug 1136264", "url": "https://bugzilla.suse.com/1136264" }, { "category": "self", "summary": "SUSE Bug 1136271", "url": "https://bugzilla.suse.com/1136271" }, { "category": "self", "summary": "SUSE Bug 1136333", "url": "https://bugzilla.suse.com/1136333" }, { "category": "self", "summary": "SUSE Bug 1136342", "url": "https://bugzilla.suse.com/1136342" }, { "category": "self", "summary": "SUSE Bug 1136343", "url": "https://bugzilla.suse.com/1136343" }, { "category": "self", "summary": "SUSE Bug 1136345", "url": "https://bugzilla.suse.com/1136345" }, { "category": "self", "summary": "SUSE Bug 1136347", "url": "https://bugzilla.suse.com/1136347" }, { "category": "self", "summary": "SUSE Bug 1136348", "url": "https://bugzilla.suse.com/1136348" }, { "category": "self", "summary": "SUSE Bug 1136353", "url": "https://bugzilla.suse.com/1136353" }, { "category": "self", "summary": "SUSE Bug 1136424", "url": "https://bugzilla.suse.com/1136424" }, { "category": "self", "summary": "SUSE Bug 1136428", "url": "https://bugzilla.suse.com/1136428" }, { "category": "self", "summary": "SUSE Bug 1136430", "url": "https://bugzilla.suse.com/1136430" }, { "category": "self", "summary": "SUSE Bug 1136432", "url": "https://bugzilla.suse.com/1136432" }, { "category": "self", "summary": "SUSE Bug 1136434", "url": "https://bugzilla.suse.com/1136434" }, { "category": "self", "summary": "SUSE Bug 1136435", "url": "https://bugzilla.suse.com/1136435" }, { "category": "self", "summary": "SUSE Bug 1136438", "url": "https://bugzilla.suse.com/1136438" }, { "category": "self", "summary": "SUSE Bug 1136439", "url": "https://bugzilla.suse.com/1136439" }, { "category": "self", "summary": "SUSE Bug 1136456", "url": "https://bugzilla.suse.com/1136456" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1136462", "url": "https://bugzilla.suse.com/1136462" }, { "category": "self", "summary": "SUSE Bug 1136467", "url": "https://bugzilla.suse.com/1136467" }, { "category": "self", "summary": "SUSE Bug 1136469", "url": "https://bugzilla.suse.com/1136469" }, { "category": "self", "summary": "SUSE Bug 1136477", "url": "https://bugzilla.suse.com/1136477" }, { "category": "self", "summary": "SUSE Bug 1136478", "url": "https://bugzilla.suse.com/1136478" }, { "category": "self", "summary": "SUSE Bug 1136498", "url": "https://bugzilla.suse.com/1136498" }, { "category": "self", "summary": "SUSE Bug 1136573", "url": "https://bugzilla.suse.com/1136573" }, { "category": "self", "summary": "SUSE Bug 1136586", "url": "https://bugzilla.suse.com/1136586" }, { "category": "self", "summary": "SUSE Bug 1136598", "url": "https://bugzilla.suse.com/1136598" }, { "category": "self", "summary": "SUSE Bug 1136881", "url": "https://bugzilla.suse.com/1136881" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1136935", "url": "https://bugzilla.suse.com/1136935" }, { "category": "self", "summary": "SUSE Bug 1136978", "url": "https://bugzilla.suse.com/1136978" }, { "category": "self", "summary": "SUSE Bug 1136990", "url": "https://bugzilla.suse.com/1136990" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137151", "url": "https://bugzilla.suse.com/1137151" }, { "category": "self", "summary": "SUSE Bug 1137152", "url": "https://bugzilla.suse.com/1137152" }, { "category": "self", "summary": "SUSE Bug 1137153", "url": "https://bugzilla.suse.com/1137153" }, { "category": "self", "summary": "SUSE Bug 1137162", "url": "https://bugzilla.suse.com/1137162" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137201", "url": "https://bugzilla.suse.com/1137201" }, { "category": "self", "summary": "SUSE Bug 1137224", "url": "https://bugzilla.suse.com/1137224" }, { "category": "self", "summary": "SUSE Bug 1137232", "url": "https://bugzilla.suse.com/1137232" }, { "category": "self", "summary": "SUSE Bug 1137233", "url": "https://bugzilla.suse.com/1137233" }, { "category": "self", "summary": "SUSE Bug 1137236", "url": "https://bugzilla.suse.com/1137236" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137372", "url": "https://bugzilla.suse.com/1137372" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137444", "url": "https://bugzilla.suse.com/1137444" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137586", "url": "https://bugzilla.suse.com/1137586" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137739", "url": "https://bugzilla.suse.com/1137739" }, { "category": "self", "summary": "SUSE Bug 1137752", "url": "https://bugzilla.suse.com/1137752" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137985", "url": "https://bugzilla.suse.com/1137985" }, { "category": "self", "summary": "SUSE Bug 1137995", "url": "https://bugzilla.suse.com/1137995" }, { "category": "self", "summary": "SUSE Bug 1137996", "url": "https://bugzilla.suse.com/1137996" }, { "category": "self", "summary": "SUSE Bug 1137998", "url": "https://bugzilla.suse.com/1137998" }, { "category": "self", "summary": "SUSE Bug 1137999", "url": "https://bugzilla.suse.com/1137999" }, { "category": "self", "summary": "SUSE Bug 1138000", "url": "https://bugzilla.suse.com/1138000" }, { "category": "self", "summary": "SUSE Bug 1138002", "url": "https://bugzilla.suse.com/1138002" }, { "category": "self", "summary": "SUSE Bug 1138003", "url": "https://bugzilla.suse.com/1138003" }, { "category": "self", "summary": "SUSE Bug 1138005", "url": "https://bugzilla.suse.com/1138005" }, { "category": "self", "summary": "SUSE Bug 1138006", "url": "https://bugzilla.suse.com/1138006" }, { "category": "self", "summary": "SUSE Bug 1138007", "url": "https://bugzilla.suse.com/1138007" }, { "category": "self", "summary": "SUSE Bug 1138008", "url": "https://bugzilla.suse.com/1138008" }, { "category": "self", "summary": "SUSE Bug 1138009", "url": "https://bugzilla.suse.com/1138009" }, { "category": "self", "summary": "SUSE Bug 1138010", "url": "https://bugzilla.suse.com/1138010" }, { "category": "self", "summary": "SUSE Bug 1138011", "url": "https://bugzilla.suse.com/1138011" }, { "category": "self", "summary": "SUSE Bug 1138012", "url": "https://bugzilla.suse.com/1138012" }, { "category": "self", "summary": "SUSE Bug 1138013", "url": "https://bugzilla.suse.com/1138013" }, { "category": "self", "summary": "SUSE Bug 1138014", "url": "https://bugzilla.suse.com/1138014" }, { "category": "self", "summary": "SUSE Bug 1138015", "url": "https://bugzilla.suse.com/1138015" }, { "category": "self", "summary": "SUSE Bug 1138016", "url": "https://bugzilla.suse.com/1138016" }, { "category": "self", "summary": "SUSE Bug 1138017", "url": "https://bugzilla.suse.com/1138017" }, { "category": "self", "summary": "SUSE Bug 1138018", "url": "https://bugzilla.suse.com/1138018" }, { "category": "self", "summary": "SUSE Bug 1138019", "url": "https://bugzilla.suse.com/1138019" }, { "category": "self", "summary": "SUSE Bug 1138263", "url": "https://bugzilla.suse.com/1138263" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138336", "url": "https://bugzilla.suse.com/1138336" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138681", "url": "https://bugzilla.suse.com/1138681" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1138732", "url": "https://bugzilla.suse.com/1138732" }, { "category": "self", "summary": "SUSE Bug 1138874", "url": "https://bugzilla.suse.com/1138874" }, { "category": "self", "summary": "SUSE Bug 1138879", "url": "https://bugzilla.suse.com/1138879" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139619", "url": "https://bugzilla.suse.com/1139619" }, { "category": "self", "summary": "SUSE Bug 1139712", "url": "https://bugzilla.suse.com/1139712" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140228", "url": "https://bugzilla.suse.com/1140228" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140454", "url": "https://bugzilla.suse.com/1140454" }, { "category": "self", "summary": "SUSE Bug 1140463", "url": "https://bugzilla.suse.com/1140463" }, { "category": "self", "summary": "SUSE Bug 1140559", "url": "https://bugzilla.suse.com/1140559" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140676", "url": "https://bugzilla.suse.com/1140676" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141312", "url": "https://bugzilla.suse.com/1141312" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142052", "url": "https://bugzilla.suse.com/1142052" }, { "category": "self", "summary": "SUSE Bug 1142083", "url": "https://bugzilla.suse.com/1142083" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142115", "url": "https://bugzilla.suse.com/1142115" }, { "category": "self", "summary": "SUSE Bug 1142119", "url": "https://bugzilla.suse.com/1142119" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142623", "url": "https://bugzilla.suse.com/1142623" }, { "category": "self", "summary": "SUSE Bug 1142673", "url": "https://bugzilla.suse.com/1142673" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143209", "url": "https://bugzilla.suse.com/1143209" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12127 page", "url": "https://www.suse.com/security/cve/CVE-2018-12127/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12130 page", "url": "https://www.suse.com/security/cve/CVE-2018-12130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16880 page", "url": "https://www.suse.com/security/cve/CVE-2018-16880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7191 page", "url": "https://www.suse.com/security/cve/CVE-2018-7191/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10124 page", "url": "https://www.suse.com/security/cve/CVE-2019-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11085 page", "url": "https://www.suse.com/security/cve/CVE-2019-11085/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11091 page", "url": "https://www.suse.com/security/cve/CVE-2019-11091/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11486 page", "url": "https://www.suse.com/security/cve/CVE-2019-11486/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11487 page", "url": "https://www.suse.com/security/cve/CVE-2019-11487/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11811 page", "url": "https://www.suse.com/security/cve/CVE-2019-11811/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11815 page", "url": "https://www.suse.com/security/cve/CVE-2019-11815/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11833 page", "url": "https://www.suse.com/security/cve/CVE-2019-11833/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11884 page", "url": "https://www.suse.com/security/cve/CVE-2019-11884/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12380 page", "url": "https://www.suse.com/security/cve/CVE-2019-12380/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12382 page", "url": "https://www.suse.com/security/cve/CVE-2019-12382/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12817 page", "url": "https://www.suse.com/security/cve/CVE-2019-12817/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13233 page", "url": "https://www.suse.com/security/cve/CVE-2019-13233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5489 page", "url": "https://www.suse.com/security/cve/CVE-2019-5489/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9003 page", "url": "https://www.suse.com/security/cve/CVE-2019-9003/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9503 page", "url": "https://www.suse.com/security/cve/CVE-2019-9503/" }, { "category": "self", "summary": "SUSE Bug SLE-4678", "url": "https://bugzilla.suse.com/SLE-4678" }, { "category": "self", "summary": "SUSE Bug SLE-4679", "url": "https://bugzilla.suse.com/SLE-4679" }, { "category": "self", "summary": "SUSE Bug SLE-4681", "url": "https://bugzilla.suse.com/SLE-4681" }, { "category": "self", "summary": "SUSE Bug SLE-4683", "url": "https://bugzilla.suse.com/SLE-4683" }, { "category": "self", "summary": "SUSE Bug SLE-4684", "url": "https://bugzilla.suse.com/SLE-4684" }, { "category": "self", "summary": "SUSE Bug SLE-4688", "url": "https://bugzilla.suse.com/SLE-4688" }, { "category": "self", "summary": "SUSE Bug SLE-4689", "url": "https://bugzilla.suse.com/SLE-4689" }, { "category": "self", "summary": "SUSE Bug SLE-4692", "url": "https://bugzilla.suse.com/SLE-4692" }, { "category": "self", "summary": "SUSE Bug SLE-4693", "url": "https://bugzilla.suse.com/SLE-4693" }, { "category": "self", "summary": "SUSE Bug SLE-4694", "url": "https://bugzilla.suse.com/SLE-4694" }, { "category": "self", "summary": "SUSE Bug SLE-4695", "url": "https://bugzilla.suse.com/SLE-4695" }, { "category": "self", "summary": "SUSE Bug SLE-4699", "url": "https://bugzilla.suse.com/SLE-4699" }, { "category": "self", "summary": "SUSE Bug SLE-4710", "url": "https://bugzilla.suse.com/SLE-4710" }, { "category": "self", "summary": "SUSE Bug SLE-4712", "url": "https://bugzilla.suse.com/SLE-4712" }, { "category": "self", "summary": "SUSE Bug SLE-4717", "url": "https://bugzilla.suse.com/SLE-4717" }, { "category": "self", "summary": "SUSE Bug SLE-4721", "url": "https://bugzilla.suse.com/SLE-4721" }, { "category": "self", "summary": "SUSE Bug SLE-4722", "url": "https://bugzilla.suse.com/SLE-4722" }, { "category": "self", "summary": "SUSE Bug SLE-4994", "url": "https://bugzilla.suse.com/SLE-4994" }, { "category": "self", "summary": "SUSE Bug SLE-5759", "url": "https://bugzilla.suse.com/SLE-5759" }, { "category": "self", "summary": "SUSE Bug SLE-5789", "url": "https://bugzilla.suse.com/SLE-5789" }, { "category": "self", "summary": "SUSE Bug SLE-5802", "url": "https://bugzilla.suse.com/SLE-5802" }, { "category": "self", "summary": "SUSE Bug SLE-5954", "url": "https://bugzilla.suse.com/SLE-5954" }, { "category": "self", "summary": "SUSE Bug SLE-6197", "url": "https://bugzilla.suse.com/SLE-6197" } ], "title": "Security update for kernel-source-rt", "tracking": { "current_release_date": "2019-09-23T07:31:22Z", "generator": { "date": "2019-09-23T07:31:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2430-1", "initial_release_date": "2019-09-23T07:31:22Z", "revision_history": [ { "date": "2019-09-23T07:31:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-14.8.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-14.8.1.noarch", "product_id": "kernel-devel-rt-4.12.14-14.8.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-14.8.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-14.8.1.noarch", "product_id": "kernel-source-rt-4.12.14-14.8.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-base-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-14.8.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP1", "product": { "name": "SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-14.8.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-14.8.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-14.8.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-14.8.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12127" } ], "notes": [ { "category": "general", "text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12127", "url": "https://www.suse.com/security/cve/CVE-2018-12127" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-12127" }, { "cve": "CVE-2018-12130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12130" } ], "notes": [ { "category": "general", "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12130", "url": "https://www.suse.com/security/cve/CVE-2018-12130" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-12130" }, { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-16880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16880" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16880", "url": "https://www.suse.com/security/cve/CVE-2018-16880" }, { "category": "external", "summary": "SUSE Bug 1122767 for CVE-2018-16880", "url": "https://bugzilla.suse.com/1122767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-16880" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2018-7191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7191" } ], "notes": [ { "category": "general", "text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7191", "url": "https://www.suse.com/security/cve/CVE-2018-7191" }, { "category": "external", "summary": "SUSE Bug 1135603 for CVE-2018-7191", "url": "https://bugzilla.suse.com/1135603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-7191" }, { "cve": "CVE-2019-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10124" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10124", "url": "https://www.suse.com/security/cve/CVE-2019-10124" }, { "category": "external", "summary": "SUSE Bug 1130699 for CVE-2019-10124", "url": "https://bugzilla.suse.com/1130699" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-10124" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-11085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11085" } ], "notes": [ { "category": "general", "text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11085", "url": "https://www.suse.com/security/cve/CVE-2019-11085" }, { "category": "external", "summary": "SUSE Bug 1135278 for CVE-2019-11085", "url": "https://bugzilla.suse.com/1135278" }, { "category": "external", "summary": "SUSE Bug 1135280 for CVE-2019-11085", "url": "https://bugzilla.suse.com/1135280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11085" }, { "cve": "CVE-2019-11091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11091" } ], "notes": [ { "category": "general", "text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11091", "url": "https://www.suse.com/security/cve/CVE-2019-11091" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1135394 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1135394" }, { "category": "external", "summary": "SUSE Bug 1138043 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138043" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11091" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-11486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11486" } ], "notes": [ { "category": "general", "text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11486", "url": "https://www.suse.com/security/cve/CVE-2019-11486" }, { "category": "external", "summary": "SUSE Bug 1133188 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1133188" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1156434" }, { "category": "external", "summary": "SUSE Bug 1173667 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1173667" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11486" }, { "cve": "CVE-2019-11487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11487" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11487", "url": "https://www.suse.com/security/cve/CVE-2019-11487" }, { "category": "external", "summary": "SUSE Bug 1133190 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133190" }, { "category": "external", "summary": "SUSE Bug 1133191 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11487" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-11811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11811" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11811", "url": "https://www.suse.com/security/cve/CVE-2019-11811" }, { "category": "external", "summary": "SUSE Bug 1134397 for CVE-2019-11811", "url": "https://bugzilla.suse.com/1134397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-11811" }, { "cve": "CVE-2019-11815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11815" } ], "notes": [ { "category": "general", "text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11815", "url": "https://www.suse.com/security/cve/CVE-2019-11815" }, { "category": "external", "summary": "SUSE Bug 1134537 for CVE-2019-11815", "url": "https://bugzilla.suse.com/1134537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11815" }, { "cve": "CVE-2019-11833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11833" } ], "notes": [ { "category": "general", "text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11833", "url": "https://www.suse.com/security/cve/CVE-2019-11833" }, { "category": "external", "summary": "SUSE Bug 1135281 for CVE-2019-11833", "url": "https://bugzilla.suse.com/1135281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11833" }, { "cve": "CVE-2019-11884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11884" } ], "notes": [ { "category": "general", "text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11884", "url": "https://www.suse.com/security/cve/CVE-2019-11884" }, { "category": "external", "summary": "SUSE Bug 1134848 for CVE-2019-11884", "url": "https://bugzilla.suse.com/1134848" }, { "category": "external", "summary": "SUSE Bug 1139868 for CVE-2019-11884", "url": "https://bugzilla.suse.com/1139868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11884" }, { "cve": "CVE-2019-12380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12380" } ], "notes": [ { "category": "general", "text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12380", "url": "https://www.suse.com/security/cve/CVE-2019-12380" }, { "category": "external", "summary": "SUSE Bug 1136598 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1136598" }, { "category": "external", "summary": "SUSE Bug 1155298 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1155298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-12380" }, { "cve": "CVE-2019-12382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12382" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12382", "url": "https://www.suse.com/security/cve/CVE-2019-12382" }, { "category": "external", "summary": "SUSE Bug 1136586 for CVE-2019-12382", "url": "https://bugzilla.suse.com/1136586" }, { "category": "external", "summary": "SUSE Bug 1155298 for CVE-2019-12382", "url": "https://bugzilla.suse.com/1155298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-12382" }, { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12817" } ], "notes": [ { "category": "general", "text": "arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12817", "url": "https://www.suse.com/security/cve/CVE-2019-12817" }, { "category": "external", "summary": "SUSE Bug 1138263 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138263" }, { "category": "external", "summary": "SUSE Bug 1138264 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2019-12817" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-12819" }, { "cve": "CVE-2019-13233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13233" } ], "notes": [ { "category": "general", "text": "In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13233", "url": "https://www.suse.com/security/cve/CVE-2019-13233" }, { "category": "external", "summary": "SUSE Bug 1140454 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1140454" }, { "category": "external", "summary": "SUSE Bug 1144502 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1144502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-13233" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-14284" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-5489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5489" } ], "notes": [ { "category": "general", "text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5489", "url": "https://www.suse.com/security/cve/CVE-2019-5489" }, { "category": "external", "summary": "SUSE Bug 1120843 for CVE-2019-5489", "url": "https://bugzilla.suse.com/1120843" }, { "category": "external", "summary": "SUSE Bug 1120885 for CVE-2019-5489", "url": "https://bugzilla.suse.com/1120885" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-5489" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-9003", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9003" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a \"service ipmievd restart\" loop.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9003", "url": "https://www.suse.com/security/cve/CVE-2019-9003" }, { "category": "external", "summary": "SUSE Bug 1126704 for CVE-2019-9003", "url": "https://bugzilla.suse.com/1126704" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-9003" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2019-9503", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9503" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9503", "url": "https://www.suse.com/security/cve/CVE-2019-9503" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1132828" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1156653 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1156653" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-9503" } ] }
rhsa-2020:1567
Vulnerability from csaf_redhat
Published
2020-04-28 15:41
Modified
2025-08-04 12:22
Summary
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)
* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)
* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)
* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)
* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)
* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)
* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)
* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)
* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)
* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)
* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)
* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)
* KVM-RT guest fails boot with emulatorsched (BZ#1712781)
* 8 vCPU guest need max latency < 20 us with stress [RT-8.2] (BZ#1757165)
* Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)
* RT: Add rpm Provide of 'kernel' to indicate that this is a kernel package (BZ#1796284)
* [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)
Enhancement(s):
* update to the upstream 5.x RT patchset (BZ#1680161)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)\n\n* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)\n\n* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)\n\n* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)\n\n* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)\n\n* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)\n\n* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)\n\n* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)\n\n* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)\n\n* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)\n\n* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)\n\n* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)\n\n* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)\n\n* KVM-RT guest fails boot with emulatorsched (BZ#1712781)\n\n* 8 vCPU guest need max latency \u003c 20 us with stress [RT-8.2] (BZ#1757165)\n\n* Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)\n\n* RT: Add rpm Provide of \u0027kernel\u0027 to indicate that this is a kernel package (BZ#1796284)\n\n* [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)\n\nEnhancement(s):\n\n* update to the upstream 5.x RT patchset (BZ#1680161)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1567", "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "1708716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708716" }, { "category": "external", "summary": "1712781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712781" }, { "category": "external", "summary": "1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "1757165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757165" }, { "category": "external", "summary": "1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "1768730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768730" }, { "category": "external", "summary": "1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "1772738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772738" }, { "category": "external", "summary": "1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "1788352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788352" }, { "category": "external", "summary": "1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "1796284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796284" }, { "category": "external", "summary": "1806871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806871" }, { "category": "external", "summary": "1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1567.json" } ], "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T12:22:08+00:00", "generator": { "date": "2025-08-04T12:22:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:1567", "initial_release_date": "2020-04-28T15:41:38+00:00", "revision_history": [ { "date": "2020-04-28T15:41:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-28T15:41:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:22:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.rt13.51.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product_id": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.rt13.51.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "cve": "CVE-2019-5108", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789927" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the WiFi station handoff code. An attacker within the radio range could use this flaw to deny a valid device from joining the access point.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5108" }, { "category": "external", "summary": "RHBZ#1789927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5108", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108" } ], "release_date": "2019-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "At this time there is no known mitigations to this issue other than to install the updated kernel package.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS" }, { "cve": "CVE-2019-8980", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1679972" } ], "notes": [ { "category": "description", "text": "A kernel memory leak was found in the kernel_read_file() function in the fs/exec.c file in the Linux kernel. An attacker could use this flaw to cause a memory leak and thus a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "RHBZ#1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-8980", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980" } ], "release_date": "2019-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service" }, { "cve": "CVE-2019-10639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel derived the IP ID field from a partial kernel space address returned by a net_hash_mix() function. A remote user could observe this IP ID field to extract the kernel\u00a0address bits used to derive its value, which may result in leaking the hash key and potentially defeating KASLR.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "RHBZ#1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10639", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639" }, { "category": "external", "summary": "https://arxiv.org/pdf/1906.10478.pdf", "url": "https://arxiv.org/pdf/1906.10478.pdf" } ], "release_date": "2019-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR" }, { "cve": "CVE-2019-12819", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-06-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1721962" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s MDIO section of the network management subsystem. An attacker who is able to hot-plug a network device can trigger the __mdiobus_register() function in drivers/net/phy/mdio_bus.c, which can cause a use-after-free condition causing a memory corruption and kernel panic or privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "RHBZ#1721962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12819" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819" } ], "release_date": "2019-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c" }, { "cve": "CVE-2019-15090", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743526" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in the Qlogic ISCSI module in the Linux kernel\u0027s qedi_dbg_* family of functions in drivers/scsi/qedi/qedi_dbg.c. Here a local attacker with a special user privilege account (or a root) can cause an out-of-bound memory access leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15090" }, { "category": "external", "summary": "RHBZ#1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15090", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure" }, { "cve": "CVE-2019-15099", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743560" } ], "notes": [ { "category": "description", "text": "A null pointer dereference flaw was discovered in the Linux kernel\u0027s implementation of the ath10k USB device driver. The vulnerability requires the attacker to plug in a specially crafted hardware device that present endpoint descriptors that normal ath10k devices do not recognize. System availability is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "RHBZ#1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15099", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "As the ath10k module will be auto-loaded when required, its use can be disabled by preventing the module from loading using the following instructions.\n\nOn the command line, as root, execute the following command:\n# echo \"install ath10k_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-ath10k_usb.conf \n \nThe system will need to be restarted if the ath10k_usb module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while the ath10k WiFi network interface is in use. If the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash" }, { "cve": "CVE-2019-15221", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the LINE6 drivers in the Linux kernel allocated buffers for USB packets. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15221" }, { "category": "external", "summary": "RHBZ#1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15221", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c" }, { "cve": "CVE-2019-15223", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749976" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the Line 6 POD USB driver in the Linux kernel handled disconnection. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/driver.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15223" }, { "category": "external", "summary": "RHBZ#1749976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15223", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/driver.c" }, { "cve": "CVE-2019-16234", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760441" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A check was not done on the alloc_workqueue return value of the iwl_trans_pcie_alloc function potentially leading to a NULL pointer dereference. This error condition could lead to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (system-wide out-of-memory condition, high privileges or physical access). The attacker would have to be able to induce system-wide out-of-memory condition which itself could be seen as a local denial of service. It could be argued that having such privileges has the same impact as the flaw itself.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "RHBZ#1760441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16234", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c" }, { "cve": "CVE-2019-17053", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758242" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the Linux kernel\u0027s AF_IEEE802154 networking module where permissions checks are not enforced. This can allow an unprivileged user to create raw sockets for this protocol leading to the potential for data leaks or system unavailability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as moderate; there are no known exploits using this mechanism as an attack surface against the system affected by this bug.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17053" }, { "category": "external", "summary": "RHBZ#1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17053", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol" }, { "cve": "CVE-2019-17055", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758248" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u2019s implementation of the AF_ISDN protocol, which does not enforce the CAP_NET_RAW capability. This flaw can allow unprivileged users to create a raw socket for this protocol. This could further allow the user to control the availability of an existing ISDN circuit.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17055" }, { "category": "external", "summary": "RHBZ#1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "At this time the only known way to \u0027mitigate\u0027 this flaw is to blacklist the kernel module from being loaded. Creating raw sockets with this protocol is a method of communicating with ISDN hardware, a technology that is becoming less and less common.\n\nCheck https://access.redhat.com/solutions/41278 for instructions on how to disable the mISDN_core.ko module.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol" }, { "cve": "CVE-2019-18282", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796360" } ], "notes": [ { "category": "description", "text": "A device tracking vulnerability was found in the flow_dissector feature in the Linux kernel. This flaw occurs because the auto flowlabel of the UDP IPv6 packet relies on a 32-bit hashmd value as a secret, and jhash (instead of siphash) is used. The hashmd value remains the same starting from boot time and can be inferred by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: The flow_dissector feature allows device tracking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18282" }, { "category": "external", "summary": "RHBZ#1796360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18282", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: The flow_dissector feature allows device tracking" }, { "cve": "CVE-2019-18805", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2019-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1771496" } ], "notes": [ { "category": "description", "text": "A flaw was reported in the Linux kernel\u0027s TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) is set incorrectly. This causes an integer overflow which can lead to a denial Of service (DOS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "RHBZ#1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c" }, { "cve": "CVE-2019-19045", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774983" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Mellanox Technologies Innova driver mishandles resource cleanup on error. An attacker, able to trigger error could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the privileges needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19045" }, { "category": "external", "summary": "RHBZ#1774983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774983" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19045", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c" }, { "cve": "CVE-2019-19047", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Mellanox 5th generation network adapters (ConnectX series) core driver in the Linux kernel handled resource cleanup in the mlx5_fw_fatal_reporter_dump function. This flaw allows an attacker with the ability to trigger errors in the mlx5_crdump_collect function to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19047" }, { "category": "external", "summary": "RHBZ#1774991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19047", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c" }, { "cve": "CVE-2019-19055", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Wireless configuration API functionality mishandles resource cleanup in nl80211_get_ftm_responder_stats function. An attacker able to trigger the resource cleanup code path could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19055" }, { "category": "external", "summary": "RHBZ#1775074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055" } ], "release_date": "2019-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module cfg80211. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS" }, { "cve": "CVE-2019-19057", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775050" } ], "notes": [ { "category": "description", "text": "Two memory leak flaws were found in the Linux kernel\u0027s mwifiex_pcie_init_evt_ring() function. A local attacker, able to reload the kernel module or hotplug Marvell WiFi hardware using this driver, can cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19057" }, { "category": "external", "summary": "RHBZ#1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19057", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS" }, { "cve": "CVE-2019-19058", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775047" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel Wireless WiFi MVM Firmware driver mishandles resource cleanup during device coredump. An attacker able to trigger the device coredump and system-wide out of memory conditions at the same time could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19058" }, { "category": "external", "summary": "RHBZ#1775047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775047" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19058", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlmvm. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS" }, { "cve": "CVE-2019-19059", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775042" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Intel Wireless driver in the Linux kernel handled resource cleanup during Gen 3 device initialization. This flaw allows an attacker with the ability to restrict access to DMA coherent memory on device initialization, to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (ability to restrict access to dma coherent memory on device initialization).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19059" }, { "category": "external", "summary": "RHBZ#1775042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19059", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19059" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlwifi. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS" }, { "cve": "CVE-2019-19065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775000" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel OPA Gen1 driver mishandles resource cleanup. An attacker able to induce low memory condition on the system could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19065" }, { "category": "external", "summary": "RHBZ#1775000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19065", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module hfi1. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS" }, { "cve": "CVE-2019-19067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774968" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The acp_hw_init function fails to cleanup resources properly. A local attacker can induce an error condition to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19067" }, { "category": "external", "summary": "RHBZ#1774968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19067", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS" }, { "cve": "CVE-2019-19073", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774937" } ], "notes": [ { "category": "description", "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19073" }, { "category": "external", "summary": "RHBZ#1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19073", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)" }, { "cve": "CVE-2019-19074", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774933" } ], "notes": [ { "category": "description", "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a memory leak in the ath9k management function in allows local DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19074" }, { "category": "external", "summary": "RHBZ#1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19074", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a memory leak in the ath9k management function in allows local DoS" }, { "cve": "CVE-2019-19077", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775724" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Broadcom NetXtreme HCA driver in the Linux kernel, in the way it handled resource cleanup on the copy to userspace error. This flaw allows a local attacker to trigger this error and crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because local attacker is needed in order to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19077" }, { "category": "external", "summary": "RHBZ#1775724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19077", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077" } ], "release_date": "2019-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module bnxt_re. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c" }, { "cve": "CVE-2019-19532", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781821" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s HID drivers. An attacker, able to plug in a malicious USB device, can crash the system or read and write to memory with an incorrect address.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: malicious USB devices can lead to multiple out-of-bounds write", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was rated as having Moderate impact because of the need of physical access to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19532" }, { "category": "external", "summary": "RHBZ#1781821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19532", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532" } ], "release_date": "2019-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: malicious USB devices can lead to multiple out-of-bounds write" }, { "cve": "CVE-2019-19534", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783540" } ], "notes": [ { "category": "description", "text": "An information-leak flaw was found in the Linux kernel\u0027s pcan USB driver. When a device using this driver connects to the system, the stack information is leaked to the CAN bus, a controller area network for automobiles. The highest threat with this vulnerability is breach of data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19534" }, { "category": "external", "summary": "RHBZ#1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19534", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534" } ], "release_date": "2019-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "As the devices module will be auto-loaded when the USB CAN bus adapter is connected, its can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install peak_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-peak-usb-canbus.conf \n \nThe system will need to be restarted if the peak_usb module is already loaded. In most circumstances, the kernel modules will be unable to be unloaded while any CAN bus interfaces are active and the protocol is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver" }, { "cve": "CVE-2019-19768", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786164" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Linux kernel\u2019s implementation of blktrace in the __blk_add_trace function. A local attacker with permissions to run block trace instructions against a device can create a situation where the core block_trace object is used after it is freed. The attacker can pre-groom memory to race this use-after-free to create a condition where the memory is corrupted and cause privilege escalation.\r\n\r\nThe ability to create this condition requires elevated privileges, and it has been decided that this change in Red Hat Enterprise Linux 5 and 6 would risk introducing possible regressions and will not be backported.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "RHBZ#1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19768", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768" } ], "release_date": "2019-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c" }, { "cve": "CVE-2019-19922", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1792512" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s scheduler, where it can allow attackers to cause a denial of service against non-CPU-bound applications by generating a workload that triggers unwanted scheduling slice expiration. A local attacker who can trigger a specific workload type could abuse this technique to trigger a system to be seen as degraded, and possibly trigger workload-rebalance in systems that use the slice-expiration metric as a measure of system health.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19922" }, { "category": "external", "summary": "RHBZ#1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19922", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922" } ], "release_date": "2019-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications" }, { "acknowledgments": [ { "names": [ "Xiumei Mu" ], "organization": "Red Hat QE Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1749", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "discovery_date": "2020-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1809833" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: some ipv6 protocols not encrypted over ipsec tunnel", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "RHBZ#1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1749", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749" } ], "release_date": "2020-03-04T01:29:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Disabling the IPV6 protocol may be a suitable workaround for systems that do not require the protocol to function correctly, however, if IPV6 is not in use this flaw will not be triggered.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: some ipv6 protocols not encrypted over ipsec tunnel" }, { "cve": "CVE-2020-7053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795624" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s GPU driver functionality when destroying GEM context. A local user could use this flaw to crash the system or potentially escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact of this issue is Moderate, because attack is specific for certain Intel hardware and could be triggered only by local user with write access to the device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7053" }, { "category": "external", "summary": "RHBZ#1795624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7053", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In case of dedicated graphic card presence and i915 GPU is not being used, you can prevent module i915 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c" }, { "cve": "CVE-2020-10690", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1817141" } ], "notes": [ { "category": "description", "text": "There is a use-after-free problem seen due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact as there is a need for high privilege access to trigger this problem. This will need an access to /dev/ptpX which is privileged operation, also removing the module is needed (again, privileged operation).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "RHBZ#1817141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10690", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690" } ], "release_date": "2019-11-25T12:53:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open" }, { "cve": "CVE-2021-33630", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s network scheduler. This issue occurs when offloading is enabled, the cbs instance is not added to the list. The code also incorrectly handles the case when offload is disabled without removing the qdisc. This could allow a local user to cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33630" }, { "category": "external", "summary": "RHBZ#2261974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33630", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2024/q1/65", "url": "https://seclists.org/oss-sec/2024/q1/65" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled" } ] }
rhsa-2020:0740
Vulnerability from csaf_redhat
Published
2020-03-09 14:35
Modified
2025-08-03 23:49
Summary
Red Hat Security Advisory: kernel-alt security and bug fix update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)
* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)
* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)
* kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception (CVE-2019-15030)
* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* lpfc: NVMe/FC target test machine rhel-storage-62 crashes on boot when connected to FC switch (BZ#1623205)
* kernel BUG at fs/nfs_common/grace.c:107! (BZ#1637543)
* RHEL-Alt-7.6 - Need a fix for kernel bug cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias() (BZ#1711934)
* Backport "fs/dcache.c: add cond_resched() in shrink_dentry_list()" (32785c0539b7) [rhel-alt-7.6.z] (BZ#1758861)
* [RHEL-ALT-7.6.z][arm64] iommu/iova: Fix tracking of recently failed iova address (BZ#1780500)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)\n\n* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)\n\n* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)\n\n* kernel: powerpc: local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception (CVE-2019-15030)\n\n* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)\n\n* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* lpfc: NVMe/FC target test machine rhel-storage-62 crashes on boot when connected to FC switch (BZ#1623205)\n\n* kernel BUG at fs/nfs_common/grace.c:107! (BZ#1637543)\n\n* RHEL-Alt-7.6 - Need a fix for kernel bug cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias() (BZ#1711934)\n\n* Backport \"fs/dcache.c: add cond_resched() in shrink_dentry_list()\" (32785c0539b7) [rhel-alt-7.6.z] (BZ#1758861)\n\n* [RHEL-ALT-7.6.z][arm64] iommu/iova: Fix tracking of recently failed iova address (BZ#1780500)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0740", "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1663176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "category": "external", "summary": "1663179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179" }, { "category": "external", "summary": "1709837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837" }, { "category": "external", "summary": "1750813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813" }, { "category": "external", "summary": "1759313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759313" }, { "category": "external", "summary": "1763690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763690" }, { "category": "external", "summary": "1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0740.json" } ], "title": "Red Hat Security Advisory: kernel-alt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T23:49:14+00:00", "generator": { "date": "2025-08-03T23:49:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:0740", "initial_release_date": "2020-03-09T14:35:10+00:00", "revision_history": [ { "date": "2020-03-09T14:35:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-09T14:35:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:49:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.18.1.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.18.1.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "product": { "name": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "product_id": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.18.1.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "product": { "name": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "product_id": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.18.1.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.18.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.18.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "cve": "CVE-2019-3459", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663176" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of Logical Link Control and Adaptation Protocol (L2CAP), part of the Bluetooth stack. An attacker, within the range of standard Bluetooth transmissions, can create and send a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "RHBZ#1663176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3459", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459" } ], "release_date": "2019-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "workaround", "details": "- Disabling the bluetooth hardware in the bios.\n- Prevent loading of the bluetooth kernel modules.\n- Disable the bluetooth connection by putting the system in \"airport\" mode.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT" }, { "cve": "CVE-2019-3460", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663179" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_parse_conf_rsp and l2cap_parse_conf_req functions. An attacker with physical access within the range of standard Bluetooth transmission can create a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "RHBZ#1663179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3460", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3460" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460" } ], "release_date": "2019-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "workaround", "details": "- Disabling the bluetooth hardware in the bios.\n- Prevent loading of the bluetooth kernel modules.\n- Disable the bluetooth connection by putting the system in \"airport\" mode.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP" }, { "cve": "CVE-2019-11884", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-05-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the Bluetooth Human Interface Device Protocol (HIDP). A local attacker with access permissions to the Bluetooth device can issue an IOCTL which will trigger the do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c.c. This function can leak potentially sensitive information from the kernel stack memory via a HIDPCONNADD command because a name field may not be correctly NULL terminated.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11884" }, { "category": "external", "summary": "RHBZ#1709837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11884", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884" } ], "release_date": "2019-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command" }, { "cve": "CVE-2019-15030", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759313" } ], "notes": [ { "category": "description", "text": "A flaw in the Linux kernel on the PowerPC platform, was found where a local user can read vector registers of other user processes (via a Facility Unavailable exception). An attacker must start a transaction when the FPU operation begins or there is no leakage. Vector registers will become corrupted with values from the different local Linux processes, because of the missing check inside arch/powerpc/kernel/process.c. The highest threat from this vulnerability is confidentiality of data and availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: powerpc: local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "RHBZ#1759313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759313" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15030", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15030" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030" } ], "release_date": "2019-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "workaround", "details": "When applicable rely on FPU emulation (for example by rebuilding the critical services code) instead of the hardware FPU.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: powerpc: local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception" }, { "cve": "CVE-2019-15916", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1750813" } ], "notes": [ { "category": "description", "text": "A flaw that allowed an attacker to leak kernel memory was found in the network subsystem where an attacker with permissions to create tun/tap devices can create a denial of service and panic the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15916" }, { "category": "external", "summary": "RHBZ#1750813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15916", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service" }, { "cve": "CVE-2019-17666", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1763690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the RealTek wireless drivers WiFi-direct (or WiFi peer-to-peer) driver implementation. When the RealTek wireless networking hardware is configured to accept WiFi-Direct or WiFi P2P connections, an attacker within the wireless network connectivity radio range can exploit a flaw in the WiFi-direct protocol known as \"Notice of Absence\" by creating specially crafted frames which can then corrupt kernel memory as the upper bounds on the length of the frame is unchecked and supplied by the incoming packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "RHBZ#1763690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17666", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666" }, { "category": "external", "summary": "https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/", "url": "https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1" } ], "release_date": "2019-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow" }, { "cve": "CVE-2019-18805", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2019-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1771496" } ], "notes": [ { "category": "description", "text": "A flaw was reported in the Linux kernel\u0027s TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) is set incorrectly. This causes an integer overflow which can lead to a denial Of service (DOS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "RHBZ#1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "workaround", "details": "This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c" } ] }
rhsa-2019:2730
Vulnerability from csaf_redhat
Published
2019-09-11 09:23
Modified
2025-08-03 18:30
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)
* kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)
* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Backport TCP follow-up for small buffers [mrg-r] (BZ#1732110)
* update the MRG 2.5.z 3.10 realtime-kernel sources (BZ#1734469)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)\n\n* kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport TCP follow-up for small buffers [mrg-r] (BZ#1732110)\n\n* update the MRG 2.5.z 3.10 realtime-kernel sources (BZ#1734469)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2730", "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/4329821", "url": "https://access.redhat.com/articles/4329821" }, { "category": "external", "summary": "1599161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1655904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655904" }, { "category": "external", "summary": "1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "1724389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724389" }, { "category": "external", "summary": "1734469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734469" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2730.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T18:30:42+00:00", "generator": { "date": "2025-08-03T18:30:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2730", "initial_release_date": "2019-09-11T09:23:29+00:00", "revision_history": [ { "date": "2019-09-11T09:23:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-11T09:23:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T18:30:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.58.1.rt56.652.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "product_id": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.58.1.rt56.652.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.58.1.rt56.652.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.58.1.rt56.652.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-9568", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655904" } ], "notes": [ { "category": "description", "text": "A possible memory corruption due to a type confusion was found in the Linux kernel in the sk_clone_lock() function in the net/core/sock.c. The possibility of local escalation of privileges cannot be fully ruled out for a local unprivileged attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory corruption due to incorrect socket cloning", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-9568" }, { "category": "external", "summary": "RHBZ#1655904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-9568", "url": "https://www.cve.org/CVERecord?id=CVE-2018-9568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-9568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9568" } ], "release_date": "2017-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T09:23:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "category": "workaround", "details": "The currently known attack vector uses IPv6 for exploitation. If IPv6 is not needed on the host, disabling it mitigates this attack vector. Please see https://access.redhat.com/solutions/8709 for instructions on how to disable IPv6 in Red Hat Enterprise Linux.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Memory corruption due to incorrect socket cloning" }, { "cve": "CVE-2018-13405", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1599161" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "RHBZ#1599161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-13405", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405" } ], "release_date": "2018-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T09:23:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2730" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members" }, { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T09:23:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2730" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "acknowledgments": [ { "names": [ "Evgenii Shatokhin", "Vasily Averin" ], "organization": "Virtuozzo" } ], "cve": "CVE-2018-16884", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660375" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: use-after-free in svc_process_common()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16884" }, { "category": "external", "summary": "RHBZ#1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T09:23:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2730" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfs: use-after-free in svc_process_common()" }, { "cve": "CVE-2019-1125", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1724389" } ], "notes": [ { "category": "description", "text": "A Spectre gadget was found in the Linux kernel\u0027s implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: hw: Spectre SWAPGS gadget vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "RHBZ#1724389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1125", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1125" } ], "release_date": "2019-08-06T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T09:23:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "category": "workaround", "details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.58.1.rt56.652.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.58.1.rt56.652.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: hw: Spectre SWAPGS gadget vulnerability" } ] }
rhsa-2019:1873
Vulnerability from csaf_redhat
Published
2019-07-29 15:47
Modified
2025-08-03 23:47
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)
* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es) and Enhancement(s):
These updated kernel packages include also numerous bug fixes and add several enhancements. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/4309211
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es) and Enhancement(s):\n\nThese updated kernel packages include also numerous bug fixes and add several enhancements. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/4309211", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1873", "url": "https://access.redhat.com/errata/RHSA-2019:1873" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/4309211", "url": "https://access.redhat.com/articles/4309211" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "1709180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "category": "external", "summary": "1710405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710405" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1873.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-03T23:47:24+00:00", "generator": { "date": "2025-08-03T23:47:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:1873", "initial_release_date": "2019-07-29T15:47:20+00:00", "revision_history": [ { "date": "2019-07-29T15:47:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-07-29T15:47:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:47:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64", "product_id": "perf-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "product_id": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "product_id": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.27.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.27.2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.27.2.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "product_id": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.27.2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-957.27.2.el7.src", "product": { "name": "kernel-0:3.10.0-957.27.2.el7.src", "product_id": "kernel-0:3.10.0-957.27.2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.27.2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "perf-0:3.10.0-957.27.2.el7.s390x", "product_id": "perf-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x", "product_id": "python-perf-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-957.27.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.27.2.el7.s390x", "product": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x", "product_id": "kernel-0:3.10.0-957.27.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.27.2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64", "product_id": "perf-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "product_id": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.27.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.27.2.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "perf-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.27.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.27.2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.src", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.src", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.src", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.src", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.src", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.src", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.src", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.27.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.27.2.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.6.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-29T15:47:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1873" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "acknowledgments": [ { "names": [ "Evgenii Shatokhin", "Vasily Averin" ], "organization": "Virtuozzo" } ], "cve": "CVE-2018-16884", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660375" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: use-after-free in svc_process_common()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16884" }, { "category": "external", "summary": "RHBZ#1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-29T15:47:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1873" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfs: use-after-free in svc_process_common()" }, { "cve": "CVE-2019-11085", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1710405" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of GVT-g which allowed an attacker with access to a \u0027passed through\u0027 Intel i915 graphics card to possibly access resources allocated to other virtual machines, crash the host, or possibly corrupt memory leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11085" }, { "category": "external", "summary": "RHBZ#1710405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710405" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11085", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11085" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html" } ], "release_date": "2019-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-29T15:47:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1873" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation" }, { "cve": "CVE-2019-11811", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709180" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of IPMI (remote baseband access). An attacker, with local access to read /proc/ioports, may be able to create a use-after-free condition when the kernel module is unloaded which may result in privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as \"Moderate\" as the attacker needs to be able to abuse this flaw in a very narrow race condition of the kernel module being unloaded. This scoring system from this flaw differentiates from other sources as the attacker must have a local account to be able to read the file (/proc/ioports) while the module is unloaded. None of the above actions are \u0027network facing\u0027 attack vectors.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11811" }, { "category": "external", "summary": "RHBZ#1709180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811" } ], "release_date": "2019-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-29T15:47:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1873" }, { "category": "workaround", "details": "A mitigation to this flaw would be to no longer use IPMI on affected hardware until the kernel has been updated. Existing systems that have IPMI kernel modules loaded will need to unload the \"ipmi_si\" kernel module and blacklist ( See https://access.redhat.com/solutions/41278 for a guide on how to blacklist modules). Take careful consideration that if unloading and blacklisting the module, this creates a one-time attack vector window for a local attacker.", "product_ids": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Client-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Server-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.src", "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.27.2.el7.noarch", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.27.2.el7.x86_64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.ppc64le", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.s390x", "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.27.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c" } ] }
rhsa-2019:2696
Vulnerability from csaf_redhat
Published
2019-09-12 10:35
Modified
2025-08-03 18:30
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)
* kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)
* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* fragmented packets timing out (BZ#1729411)
* kernel build: speed up debuginfo extraction (BZ#1731462)
* TCP packets are segmented when sent to the VM (TAP) (BZ#1732744)
* TCP packets are segmented when sent to the VLAN device when coming from VXLAN dev. (BZ#1732809)
* skb head copy occurs when sending traffic over OVS managed VXLAN tunnel (BZ#1733626)
* [mlx4] VXLAN over VLAN TCP segmentation (BZ#1734160)
* use "make -jN" for modules_install (BZ#1735081)
* shmem: consider shm_mnt as a long-term mount (BZ#1737376)
* [ESXi][RHEL7]use-after-free of scsi_cmnd on VMWare virtual guest with vmw_pvscsi and ata_piix (BZ#1737377)
* Backport TCP follow-up for small buffers (BZ#1739127)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)\n\n* kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* fragmented packets timing out (BZ#1729411)\n\n* kernel build: speed up debuginfo extraction (BZ#1731462)\n\n* TCP packets are segmented when sent to the VM (TAP) (BZ#1732744)\n\n* TCP packets are segmented when sent to the VLAN device when coming from VXLAN dev. (BZ#1732809)\n\n* skb head copy occurs when sending traffic over OVS managed VXLAN tunnel (BZ#1733626)\n\n* [mlx4] VXLAN over VLAN TCP segmentation (BZ#1734160)\n\n* use \"make -jN\" for modules_install (BZ#1735081)\n\n* shmem: consider shm_mnt as a long-term mount (BZ#1737376)\n\n* [ESXi][RHEL7]use-after-free of scsi_cmnd on VMWare virtual guest with vmw_pvscsi and ata_piix (BZ#1737377)\n\n* Backport TCP follow-up for small buffers (BZ#1739127)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2696", "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/4329821", "url": "https://access.redhat.com/articles/4329821" }, { "category": "external", "summary": "1599161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1655904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655904" }, { "category": "external", "summary": "1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "1724389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2696.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T18:30:35+00:00", "generator": { "date": "2025-08-03T18:30:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2696", "initial_release_date": "2019-09-12T10:35:29+00:00", "revision_history": [ { "date": "2019-09-12T10:35:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T10:35:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T18:30:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.58.1.el7.x86_64", "product_id": "perf-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.58.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.58.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.58.1.el7.src", "product": { "name": "kernel-0:3.10.0-693.58.1.el7.src", "product_id": "kernel-0:3.10.0-693.58.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.58.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.58.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.58.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.58.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.58.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.58.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "perf-0:3.10.0-693.58.1.el7.s390x", "product_id": "perf-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-693.58.1.el7.s390x", "product_id": "python-perf-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.58.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64", "product_id": "perf-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.58.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "perf-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.58.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.58.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.58.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.58.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.58.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.src", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.58.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.58.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.src", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.58.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.58.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-9568", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655904" } ], "notes": [ { "category": "description", "text": "A possible memory corruption due to a type confusion was found in the Linux kernel in the sk_clone_lock() function in the net/core/sock.c. The possibility of local escalation of privileges cannot be fully ruled out for a local unprivileged attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory corruption due to incorrect socket cloning", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-9568" }, { "category": "external", "summary": "RHBZ#1655904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-9568", "url": "https://www.cve.org/CVERecord?id=CVE-2018-9568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-9568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9568" } ], "release_date": "2017-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T10:35:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "category": "workaround", "details": "The currently known attack vector uses IPv6 for exploitation. If IPv6 is not needed on the host, disabling it mitigates this attack vector. Please see https://access.redhat.com/solutions/8709 for instructions on how to disable IPv6 in Red Hat Enterprise Linux.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Memory corruption due to incorrect socket cloning" }, { "cve": "CVE-2018-13405", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1599161" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "RHBZ#1599161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-13405", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405" } ], "release_date": "2018-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T10:35:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:2696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members" }, { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T10:35:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:2696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "acknowledgments": [ { "names": [ "Evgenii Shatokhin", "Vasily Averin" ], "organization": "Virtuozzo" } ], "cve": "CVE-2018-16884", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660375" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: use-after-free in svc_process_common()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16884" }, { "category": "external", "summary": "RHBZ#1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T10:35:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:2696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfs: use-after-free in svc_process_common()" }, { "cve": "CVE-2019-1125", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1724389" } ], "notes": [ { "category": "description", "text": "A Spectre gadget was found in the Linux kernel\u0027s implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: hw: Spectre SWAPGS gadget vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "RHBZ#1724389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1125", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1125" } ], "release_date": "2019-08-06T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T10:35:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "category": "workaround", "details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.58.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.58.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.58.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: hw: Spectre SWAPGS gadget vulnerability" } ] }
rhsa-2020:1769
Vulnerability from csaf_redhat
Published
2020-04-28 15:43
Modified
2025-08-04 12:21
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)
* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)
* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)
* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)
* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)
* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)
* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)
* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)
* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)
* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)
* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)
* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)\n\n* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)\n\n* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)\n\n* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)\n\n* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)\n\n* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)\n\n* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)\n\n* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)\n\n* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)\n\n* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)\n\n* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)\n\n* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)\n\n* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1769", "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "1738741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738741" }, { "category": "external", "summary": "1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "1749633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749633" }, { "category": "external", "summary": "1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "1752765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752765" }, { "category": "external", "summary": "1757902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757902" }, { "category": "external", "summary": "1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "1765547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765547" }, { "category": "external", "summary": "1767664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767664" }, { "category": "external", "summary": "1771430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771430" }, { "category": "external", "summary": "1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "1771691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771691" }, { "category": "external", "summary": "1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "1789594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789594" }, { "category": "external", "summary": "1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "1795049", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795049" }, { "category": "external", "summary": "1803162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1803162" }, { "category": "external", "summary": "1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1769.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T12:21:57+00:00", "generator": { "date": "2025-08-04T12:21:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:1769", "initial_release_date": "2020-04-28T15:43:14+00:00", "revision_history": [ { "date": "2020-04-28T15:43:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-28T15:43:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:21:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-193.el8.aarch64", "product_id": "bpftool-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.el8.aarch64", "product_id": "kernel-core-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.aarch64", "product": { "name": "perf-0:4.18.0-193.el8.aarch64", "product_id": "perf-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.el8.aarch64", "product_id": "python3-perf-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.el8.ppc64le", "product_id": "bpftool-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.ppc64le", "product": { "name": "perf-0:4.18.0-193.el8.ppc64le", "product_id": "perf-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-193.el8.x86_64", "product_id": "bpftool-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.el8.x86_64", "product_id": "kernel-core-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.x86_64", "product": { "name": "perf-0:4.18.0-193.el8.x86_64", "product_id": "perf-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.el8.x86_64", "product_id": "python3-perf-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.s390x", "product": { "name": "bpftool-0:4.18.0-193.el8.s390x", "product_id": "bpftool-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-0:4.18.0-193.el8.s390x", "product_id": "kernel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.el8.s390x", "product_id": "kernel-headers-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.el8.s390x", "product_id": "kernel-tools-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.s390x", "product": { "name": "perf-0:4.18.0-193.el8.s390x", "product_id": "perf-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-193.el8.s390x", "product_id": "python3-perf-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.src", "product": { "name": "kernel-0:4.18.0-193.el8.src", "product_id": "kernel-0:4.18.0-193.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.el8.noarch", "product_id": "kernel-doc-0:4.18.0-193.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src" }, "product_reference": "kernel-0:4.18.0-193.el8.src", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src" }, "product_reference": "kernel-0:4.18.0-193.el8.src", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "cve": "CVE-2019-5108", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789927" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the WiFi station handoff code. An attacker within the radio range could use this flaw to deny a valid device from joining the access point.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5108" }, { "category": "external", "summary": "RHBZ#1789927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5108", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108" } ], "release_date": "2019-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "At this time there is no known mitigations to this issue other than to install the updated kernel package.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS" }, { "cve": "CVE-2019-8980", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1679972" } ], "notes": [ { "category": "description", "text": "A kernel memory leak was found in the kernel_read_file() function in the fs/exec.c file in the Linux kernel. An attacker could use this flaw to cause a memory leak and thus a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "RHBZ#1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-8980", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980" } ], "release_date": "2019-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service" }, { "cve": "CVE-2019-10639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel derived the IP ID field from a partial kernel space address returned by a net_hash_mix() function. A remote user could observe this IP ID field to extract the kernel\u00a0address bits used to derive its value, which may result in leaking the hash key and potentially defeating KASLR.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "RHBZ#1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10639", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639" }, { "category": "external", "summary": "https://arxiv.org/pdf/1906.10478.pdf", "url": "https://arxiv.org/pdf/1906.10478.pdf" } ], "release_date": "2019-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR" }, { "cve": "CVE-2019-12819", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-06-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1721962" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s MDIO section of the network management subsystem. An attacker who is able to hot-plug a network device can trigger the __mdiobus_register() function in drivers/net/phy/mdio_bus.c, which can cause a use-after-free condition causing a memory corruption and kernel panic or privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "RHBZ#1721962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12819" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819" } ], "release_date": "2019-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c" }, { "cve": "CVE-2019-15090", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743526" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in the Qlogic ISCSI module in the Linux kernel\u0027s qedi_dbg_* family of functions in drivers/scsi/qedi/qedi_dbg.c. Here a local attacker with a special user privilege account (or a root) can cause an out-of-bound memory access leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15090" }, { "category": "external", "summary": "RHBZ#1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15090", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure" }, { "cve": "CVE-2019-15099", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743560" } ], "notes": [ { "category": "description", "text": "A null pointer dereference flaw was discovered in the Linux kernel\u0027s implementation of the ath10k USB device driver. The vulnerability requires the attacker to plug in a specially crafted hardware device that present endpoint descriptors that normal ath10k devices do not recognize. System availability is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "RHBZ#1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15099", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "As the ath10k module will be auto-loaded when required, its use can be disabled by preventing the module from loading using the following instructions.\n\nOn the command line, as root, execute the following command:\n# echo \"install ath10k_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-ath10k_usb.conf \n \nThe system will need to be restarted if the ath10k_usb module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while the ath10k WiFi network interface is in use. If the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash" }, { "cve": "CVE-2019-15221", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the LINE6 drivers in the Linux kernel allocated buffers for USB packets. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15221" }, { "category": "external", "summary": "RHBZ#1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15221", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c" }, { "cve": "CVE-2019-15223", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749976" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the Line 6 POD USB driver in the Linux kernel handled disconnection. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/driver.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15223" }, { "category": "external", "summary": "RHBZ#1749976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15223", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/driver.c" }, { "cve": "CVE-2019-16234", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760441" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A check was not done on the alloc_workqueue return value of the iwl_trans_pcie_alloc function potentially leading to a NULL pointer dereference. This error condition could lead to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (system-wide out-of-memory condition, high privileges or physical access). The attacker would have to be able to induce system-wide out-of-memory condition which itself could be seen as a local denial of service. It could be argued that having such privileges has the same impact as the flaw itself.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "RHBZ#1760441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16234", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c" }, { "cve": "CVE-2019-16746", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760306" } ], "notes": [ { "category": "description", "text": "A flaw in the Linux kernel\u0027s WiFi beacon validation code was discovered. The code does not check the length of the variable length elements in the beacon head potentially leading to a buffer overflow. System availability, as well as data confidentiality and integrity, can be impacted by this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer-overflow hardening in WiFi beacon validation code.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "RHBZ#1760306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16746", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16746" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16746", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16746" } ], "release_date": "2019-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer-overflow hardening in WiFi beacon validation code." }, { "cve": "CVE-2019-17053", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758242" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the Linux kernel\u0027s AF_IEEE802154 networking module where permissions checks are not enforced. This can allow an unprivileged user to create raw sockets for this protocol leading to the potential for data leaks or system unavailability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as moderate; there are no known exploits using this mechanism as an attack surface against the system affected by this bug.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17053" }, { "category": "external", "summary": "RHBZ#1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17053", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol" }, { "cve": "CVE-2019-17055", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758248" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u2019s implementation of the AF_ISDN protocol, which does not enforce the CAP_NET_RAW capability. This flaw can allow unprivileged users to create a raw socket for this protocol. This could further allow the user to control the availability of an existing ISDN circuit.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17055" }, { "category": "external", "summary": "RHBZ#1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "At this time the only known way to \u0027mitigate\u0027 this flaw is to blacklist the kernel module from being loaded. Creating raw sockets with this protocol is a method of communicating with ISDN hardware, a technology that is becoming less and less common.\n\nCheck https://access.redhat.com/solutions/41278 for instructions on how to disable the mISDN_core.ko module.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol" }, { "cve": "CVE-2019-18282", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796360" } ], "notes": [ { "category": "description", "text": "A device tracking vulnerability was found in the flow_dissector feature in the Linux kernel. This flaw occurs because the auto flowlabel of the UDP IPv6 packet relies on a 32-bit hashmd value as a secret, and jhash (instead of siphash) is used. The hashmd value remains the same starting from boot time and can be inferred by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: The flow_dissector feature allows device tracking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18282" }, { "category": "external", "summary": "RHBZ#1796360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18282", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: The flow_dissector feature allows device tracking" }, { "cve": "CVE-2019-18805", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2019-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1771496" } ], "notes": [ { "category": "description", "text": "A flaw was reported in the Linux kernel\u0027s TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) is set incorrectly. This causes an integer overflow which can lead to a denial Of service (DOS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "RHBZ#1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c" }, { "cve": "CVE-2019-19045", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774983" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Mellanox Technologies Innova driver mishandles resource cleanup on error. An attacker, able to trigger error could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the privileges needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19045" }, { "category": "external", "summary": "RHBZ#1774983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774983" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19045", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c" }, { "cve": "CVE-2019-19047", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Mellanox 5th generation network adapters (ConnectX series) core driver in the Linux kernel handled resource cleanup in the mlx5_fw_fatal_reporter_dump function. This flaw allows an attacker with the ability to trigger errors in the mlx5_crdump_collect function to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19047" }, { "category": "external", "summary": "RHBZ#1774991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19047", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c" }, { "cve": "CVE-2019-19055", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Wireless configuration API functionality mishandles resource cleanup in nl80211_get_ftm_responder_stats function. An attacker able to trigger the resource cleanup code path could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19055" }, { "category": "external", "summary": "RHBZ#1775074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055" } ], "release_date": "2019-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module cfg80211. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS" }, { "cve": "CVE-2019-19057", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775050" } ], "notes": [ { "category": "description", "text": "Two memory leak flaws were found in the Linux kernel\u0027s mwifiex_pcie_init_evt_ring() function. A local attacker, able to reload the kernel module or hotplug Marvell WiFi hardware using this driver, can cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19057" }, { "category": "external", "summary": "RHBZ#1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19057", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS" }, { "cve": "CVE-2019-19058", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775047" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel Wireless WiFi MVM Firmware driver mishandles resource cleanup during device coredump. An attacker able to trigger the device coredump and system-wide out of memory conditions at the same time could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19058" }, { "category": "external", "summary": "RHBZ#1775047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775047" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19058", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlmvm. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS" }, { "cve": "CVE-2019-19059", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775042" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Intel Wireless driver in the Linux kernel handled resource cleanup during Gen 3 device initialization. This flaw allows an attacker with the ability to restrict access to DMA coherent memory on device initialization, to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (ability to restrict access to dma coherent memory on device initialization).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19059" }, { "category": "external", "summary": "RHBZ#1775042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19059", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19059" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlwifi. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS" }, { "cve": "CVE-2019-19065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775000" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel OPA Gen1 driver mishandles resource cleanup. An attacker able to induce low memory condition on the system could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19065" }, { "category": "external", "summary": "RHBZ#1775000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19065", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module hfi1. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS" }, { "cve": "CVE-2019-19067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774968" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The acp_hw_init function fails to cleanup resources properly. A local attacker can induce an error condition to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19067" }, { "category": "external", "summary": "RHBZ#1774968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19067", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS" }, { "cve": "CVE-2019-19073", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774937" } ], "notes": [ { "category": "description", "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19073" }, { "category": "external", "summary": "RHBZ#1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19073", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)" }, { "cve": "CVE-2019-19074", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774933" } ], "notes": [ { "category": "description", "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a memory leak in the ath9k management function in allows local DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19074" }, { "category": "external", "summary": "RHBZ#1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19074", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a memory leak in the ath9k management function in allows local DoS" }, { "cve": "CVE-2019-19077", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775724" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Broadcom NetXtreme HCA driver in the Linux kernel, in the way it handled resource cleanup on the copy to userspace error. This flaw allows a local attacker to trigger this error and crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because local attacker is needed in order to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19077" }, { "category": "external", "summary": "RHBZ#1775724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19077", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077" } ], "release_date": "2019-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module bnxt_re. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c" }, { "cve": "CVE-2019-19532", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781821" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s HID drivers. An attacker, able to plug in a malicious USB device, can crash the system or read and write to memory with an incorrect address.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: malicious USB devices can lead to multiple out-of-bounds write", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was rated as having Moderate impact because of the need of physical access to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19532" }, { "category": "external", "summary": "RHBZ#1781821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19532", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532" } ], "release_date": "2019-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: malicious USB devices can lead to multiple out-of-bounds write" }, { "cve": "CVE-2019-19534", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783540" } ], "notes": [ { "category": "description", "text": "An information-leak flaw was found in the Linux kernel\u0027s pcan USB driver. When a device using this driver connects to the system, the stack information is leaked to the CAN bus, a controller area network for automobiles. The highest threat with this vulnerability is breach of data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19534" }, { "category": "external", "summary": "RHBZ#1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19534", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534" } ], "release_date": "2019-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "As the devices module will be auto-loaded when the USB CAN bus adapter is connected, its can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install peak_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-peak-usb-canbus.conf \n \nThe system will need to be restarted if the peak_usb module is already loaded. In most circumstances, the kernel modules will be unable to be unloaded while any CAN bus interfaces are active and the protocol is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver" }, { "cve": "CVE-2019-19768", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786164" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Linux kernel\u2019s implementation of blktrace in the __blk_add_trace function. A local attacker with permissions to run block trace instructions against a device can create a situation where the core block_trace object is used after it is freed. The attacker can pre-groom memory to race this use-after-free to create a condition where the memory is corrupted and cause privilege escalation.\r\n\r\nThe ability to create this condition requires elevated privileges, and it has been decided that this change in Red Hat Enterprise Linux 5 and 6 would risk introducing possible regressions and will not be backported.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "RHBZ#1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19768", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768" } ], "release_date": "2019-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c" }, { "cve": "CVE-2019-19922", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1792512" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s scheduler, where it can allow attackers to cause a denial of service against non-CPU-bound applications by generating a workload that triggers unwanted scheduling slice expiration. A local attacker who can trigger a specific workload type could abuse this technique to trigger a system to be seen as degraded, and possibly trigger workload-rebalance in systems that use the slice-expiration metric as a measure of system health.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19922" }, { "category": "external", "summary": "RHBZ#1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19922", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922" } ], "release_date": "2019-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications" }, { "acknowledgments": [ { "names": [ "Xiumei Mu" ], "organization": "Red Hat QE Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1749", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "discovery_date": "2020-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1809833" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: some ipv6 protocols not encrypted over ipsec tunnel", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "RHBZ#1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1749", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749" } ], "release_date": "2020-03-04T01:29:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Disabling the IPV6 protocol may be a suitable workaround for systems that do not require the protocol to function correctly, however, if IPV6 is not in use this flaw will not be triggered.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: some ipv6 protocols not encrypted over ipsec tunnel" }, { "cve": "CVE-2020-7053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795624" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s GPU driver functionality when destroying GEM context. A local user could use this flaw to crash the system or potentially escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact of this issue is Moderate, because attack is specific for certain Intel hardware and could be triggered only by local user with write access to the device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7053" }, { "category": "external", "summary": "RHBZ#1795624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7053", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In case of dedicated graphic card presence and i915 GPU is not being used, you can prevent module i915 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c" }, { "cve": "CVE-2020-10690", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1817141" } ], "notes": [ { "category": "description", "text": "There is a use-after-free problem seen due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact as there is a need for high privilege access to trigger this problem. This will need an access to /dev/ptpX which is privileged operation, also removing the module is needed (again, privileged operation).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "RHBZ#1817141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10690", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690" } ], "release_date": "2019-11-25T12:53:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open" }, { "cve": "CVE-2021-33630", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s network scheduler. This issue occurs when offloading is enabled, the cbs instance is not added to the list. The code also incorrectly handles the case when offload is disabled without removing the qdisc. This could allow a local user to cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33630" }, { "category": "external", "summary": "RHBZ#2261974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33630", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2024/q1/65", "url": "https://seclists.org/oss-sec/2024/q1/65" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled" } ] }
rhsa-2019:1891
Vulnerability from csaf_redhat
Published
2019-07-29 15:22
Modified
2025-08-03 23:47
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)
* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update to the RHEL7.6.z batch#6 source tree (BZ#1718400)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL7.6.z batch#6 source tree (BZ#1718400)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1891", "url": "https://access.redhat.com/errata/RHSA-2019:1891" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "1709180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "category": "external", "summary": "1710405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710405" }, { "category": "external", "summary": "1718400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718400" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1891.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T23:47:33+00:00", "generator": { "date": "2025-08-03T23:47:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:1891", "initial_release_date": "2019-07-29T15:22:48+00:00", "revision_history": [ { "date": "2019-07-29T15:22:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-07-29T15:22:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:47:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-957.27.2.rt56.940.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-957.27.2.rt56.940.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "product": { "name": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "product_id": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-957.27.2.rt56.940.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.6.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-29T15:22:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1891" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "acknowledgments": [ { "names": [ "Evgenii Shatokhin", "Vasily Averin" ], "organization": "Virtuozzo" } ], "cve": "CVE-2018-16884", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660375" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: use-after-free in svc_process_common()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16884" }, { "category": "external", "summary": "RHBZ#1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-29T15:22:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1891" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfs: use-after-free in svc_process_common()" }, { "cve": "CVE-2019-11085", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1710405" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of GVT-g which allowed an attacker with access to a \u0027passed through\u0027 Intel i915 graphics card to possibly access resources allocated to other virtual machines, crash the host, or possibly corrupt memory leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11085" }, { "category": "external", "summary": "RHBZ#1710405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710405" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11085", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11085" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html" } ], "release_date": "2019-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-29T15:22:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1891" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation" }, { "cve": "CVE-2019-11811", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709180" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of IPMI (remote baseband access). An attacker, with local access to read /proc/ioports, may be able to create a use-after-free condition when the kernel module is unloaded which may result in privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as \"Moderate\" as the attacker needs to be able to abuse this flaw in a very narrow race condition of the kernel module being unloaded. This scoring system from this flaw differentiates from other sources as the attacker must have a local account to be able to read the file (/proc/ioports) while the module is unloaded. None of the above actions are \u0027network facing\u0027 attack vectors.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11811" }, { "category": "external", "summary": "RHBZ#1709180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811" } ], "release_date": "2019-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-29T15:22:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1891" }, { "category": "workaround", "details": "A mitigation to this flaw would be to no longer use IPMI on affected hardware until the kernel has been updated. Existing systems that have IPMI kernel modules loaded will need to unload the \"ipmi_si\" kernel module and blacklist ( See https://access.redhat.com/solutions/41278 for a guide on how to blacklist modules). Take careful consideration that if unloading and blacklisting the module, this creates a one-time attack vector window for a local attacker.", "product_ids": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.src", "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.27.2.rt56.940.el7.noarch", "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.27.2.rt56.940.el7.x86_64", "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.27.2.rt56.940.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c" } ] }
opensuse-su-2019:1757-1
Vulnerability from csaf_opensuse
Published
2019-07-20 06:26
Modified
2019-07-20 06:26
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-10638: A device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575).
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).
- CVE-2019-13233: In arch/x86/lib/insn-eval.c there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).
- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-10126: A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory corruption and possibly other consequences (bnc#1136935).
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1133738).
- CVE-2019-12817: arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected (bnc#1138263).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel. There was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).
The following non-security bugs were fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- Abort file_remove_privs() for non-reg. files (bsc#1140888).
- ACPICA: Clear status of GPEs on first direct enable (bsc#1111666).
- ACPI: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- ACPI: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- af_key: unconditionally clone on broadcast (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bpf, devmap: Add missing bulk queue free (bsc#1109837).
- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).
- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).
- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).
- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).
- bpf: sockmap fix msg->sg.size account on ingress skb (bsc#1109837).
- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).
- bpf: sockmap remove duplicate queue free (bsc#1109837).
- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- ceph: factor out ceph_lookup_inode() (bsc#1138681).
- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- ceph: quota: fix quota subdir mounts (bsc#1138681).
- ceph: remove duplicated filelock ref increase (bsc#1138681).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- Documentation/ABI: Document umwait control sysfs interfaces (jsc#SLE-5187).
- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base/devres: introduce devm_release_action() (bsc#1103992).
- drivers/base/devres: introduce devm_release_action() (bsc#1103992 FATE#326009).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).
- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).
- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).
- drm/fb-helper: generic: Do not take module ref for fbcon (bsc#1111666).
- drm: Fix drm_release() and device unplug (bsc#1111666).
- drm/i915: Add new AML_ULX support list (jsc#SLE-4986).
- drm/i915: Add new ICL PCI ID (jsc#SLE-4986).
- drm/i915/aml: Add new Amber Lake PCI ID (jsc#SLE-4986).
- drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).
- drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).
- drm/i915/cfl: Adding another PCI Device ID (jsc#SLE-4986).
- drm/i915/cml: Add CML PCI IDS (jsc#SLE-4986).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).
- drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).
- drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).
- drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).
- drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).
- drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).
- drm/i915: Split some PCI ids into separate groups (jsc#SLE-4986).
- drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).
- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).
- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).
- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).
- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).
- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).
- fs: hugetlbfs: fix hwpoison reserve accounting (bsc#1139712)
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).
- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).
- hwmon: (k10temp) Add support for family 17h (FATE#327735).
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).
- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).
- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).
- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).
- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).
- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).
- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).
- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).
- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).
- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).
- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).
- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).
- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).
- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).
- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).
- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685 FATE#325854).
- IB/hfi1: Create inline to get extended headers (bsc#1114685 FATE#325854).
- IB/hfi1: Validate fault injection opcode user input (bsc#1114685 FATE#325854).
- IB/mlx5: Verify DEVX general object type correctly (bsc#1103991 FATE#326007).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).
- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).
- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).
- kabi fixup blk_mq_register_dev() (bsc#1140637).
- kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 FATE#327056).
- kabi workaround for asus-wmi changes (bsc#1051510).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- kvm: x86: fix return value for reserved EFER (bsc#1140992).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libceph: assign cookies in linger_submit() (bsc#1135897).
- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).
- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).
- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).
- libceph: introduce alloc_watch_request() (bsc#1135897).
- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).
- libceph: preallocate message data items (bsc#1135897).
- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897). This feature was requested for SLE15 but aws reverted in packaging and master.
- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).
- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).
- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).
- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).
- mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).
- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).
- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).
- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).
- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).
- mmc: core: complete HS400 before checking status (bsc#1111666).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992 FATE#326009).
- mm: fix race on soft-offlining free huge pages (bsc#1139712).
- mm: hugetlb: delete dequeue_hwpoisoned_huge_page() (bsc#1139712).
- mm: hugetlb: prevent reuse of hwpoisoned free hugepages (bsc#1139712).
- mm: hugetlb: soft-offline: dissolve_free_huge_page() return zero on !PageHuge (bsc#bsc#1139712).
- mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (bsc#1139712).
- mm: hugetlb: soft_offline: save compound page order before page migration (bsc#1139712)
- mm: hwpoison: change PageHWPoison behavior on hugetlb pages (bsc#1139712).
- mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (bsc#1139712).
- mm: hwpoison: introduce idenfity_page_state (bsc#1139712).
- mm: hwpoison: introduce memory_failure_hugetlb() (bsc#1139712).
- mm/page_alloc.c: avoid potential NULL pointer dereference (git fixes (mm/pagealloc)).
- mm/page_alloc.c: fix never set ALLOC_NOFRAGMENT flag (git fixes (mm/pagealloc)).
- mm: soft-offline: close the race against page allocation (bsc#1139712).
- mm: soft-offline: dissolve free hugepage if soft-offlined (bsc#1139712).
- mm: soft-offline: return -EBUSY if set_hwpoison_free_buddy_page() fails (bsc#1139712).
- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).
- net: core: support XDP generic on stacked devices (bsc#1109837).
- net: do not clear sock->sk early to avoid trouble in strparser (bsc#1103990 FATE#326006).
- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).
- net: ena: add good checksum counter (bsc#1138879).
- net: ena: add handling of llq max tx burst size (bsc#1138879).
- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).
- net: ena: add newline at the end of pr_err prints (bsc#1138879).
- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).
- net: ena: allow automatic fallback to polling mode (bsc#1138879).
- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).
- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).
- net: ena: enable negotiating larger Rx ring size (bsc#1138879).
- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).
- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).
- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).
- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).
- net: ena: fix incorrect test of supported hash function (bsc#1138879).
- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).
- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).
- net: ena: gcc 8: fix compilation warning (bsc#1138879).
- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).
- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).
- net: ena: optimise calculations for CQ doorbell (bsc#1138879).
- net: ena: remove inline keyword from functions in *.c (bsc#1138879).
- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).
- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).
- net: ena: use dev_info_once instead of static variable (bsc#1138879).
- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).
- net: Fix missing meta data in skb with vlan packet (bsc#1109837).
- net/mlx5: Avoid reloading already removed devices (bsc#1103990 FATE#326006).
- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990 FATE#326006).
- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 FATE#326006).
- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990 FATE#326006).
- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 FATE#326006).
- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).
- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 FATE#326006).
- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990 FATE#326006).
- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 FATE#326006).
- net/mlx5: Set completion EQs as shared resources (bsc#1103991 FATE#326007).
- net/mlx5: Update pci error handler entries and command translation (bsc#1103991 FATE#326007).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113 FATE#326472).
- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).
- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).
- net/tls: avoid NULL pointer deref on nskb->sk in fallback (bsc#1109837).
- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).
- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).
- net/tls: do not copy negative amounts of data in reencrypt (bsc#1109837).
- net/tls: do not ignore netdev notifications if no TLS features (bsc#1109837).
- net/tls: do not leak IV and record seq when offload fails (bsc#1109837).
- net/tls: do not leak partially sent record in device mode (bsc#1109837).
- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).
- net/tls: fix copy to fragments in reencrypt (bsc#1109837).
- net/tls: fix page double free on TX cleanup (bsc#1109837).
- net/tls: fix refcount adjustment in fallback (bsc#1109837).
- net/tls: fix state removal with feature flags off (bsc#1109837).
- net/tls: fix the IV leaks (bsc#1109837).
- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).
- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).
- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).
- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).
- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).
- nl80211: fix station_info pertid memory leak (bsc#1051510).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).
- pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803 FATE#327056).
- pci: Do not poll for PME if the device is in D3cold (bsc#1051510).
- pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803).
- pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803 FATE#327056).
- pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803).
- pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803 FATE#327056).
- pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992).
- pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992 FATE#326009).
- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- pinctrl/amd: add get_direction handler (bsc#1140463).
- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).
- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).
- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).
- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).
- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).
- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).
- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).
- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).
- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).
- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).
- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).
- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).
- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).
- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).
- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).
- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).
- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).
- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).
- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).
- platform/x86: mlx-platform: Remove unused define (bsc#1112374).
- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).
- PM: ACPI/PCI: Resume all devices during hibernation (bsc#1111666).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- ppc64le: enable CONFIG_PPC_DT_CPU_FTRS (jsc#SLE-7159).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- ptrace: Fix -$gt;ptracer_cred handling for PTRACE_TRACEME (git-fixes).
- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).
- pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).
- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).
- RAS/CEC: Fix binary search function (bsc#1114279).
- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).
- rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992).
- rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992 FATE#326009).
- rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991).
- rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991 FATE#326007).
- rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991).
- rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991 FATE#326007).
- rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992).
- rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992 FATE#326009).
- Refresh patches.fixes/scsi-Introduce-scsi_start_queue.patch (bsc#1119532).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- Replace the bluetooth fix with the upstream commit (bsc#1135556)
- Reshuffle patches to match series_sort.py
- Revert 'net: ena: ethtool: add extra properties retrieval via get_priv_flags' (bsc#1138879).
- Revert 'net/mlx5e: Enable reporting checksum unnecessary also for L3 packets' (bsc#1103990).
- Revert 'net/mlx5e: Enable reporting checksum unnecessary also for L3 packets' (bsc#1103990 FATE#326006).
- Revert 'Revert 'Drop multiversion(kernel) from the KMP template ()''
- Revert 'Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)
- Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).' This broke the build with older gcc instead.
- Revert 'Sign non-x86 kernels when possible (boo#1134303)' This reverts commit bac621c6704610562ebd9e74ae5ad85ca8025681. We do not have reports of this working with all ARM architectures in all cases (boot, kexec, ..) so revert for now.
- Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).
- rpm/package-descriptions: fix typo in kernel-azure
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/pci: improve bar check (jsc#SLE-5803).
- s390/pci: improve bar check (jsc#SLE-5803 FATE#327056).
- s390/pci: map IOV resources (jsc#SLE-5803).
- s390/pci: map IOV resources (jsc#SLE-5803 FATE#327056).
- s390/pci: skip VF scanning (jsc#SLE-5803).
- s390/pci: skip VF scanning (jsc#SLE-5803 FATE#327056).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.
- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes
- scripts/git_sort/git_sort.py: drop old scsi branches
- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).
- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: fix spelling mistake 'Retreiving' -gt; 'Retrieving' (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: Remove set but not used variable 'pln' (jsc#SLE-4679 bsc#1136343).
- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).
- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).
- scsi: megaraid_sas: correct an info message (bsc#1136271).
- scsi: megaraid_sas: driver version update (bsc#1136271).
- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).
- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).
- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).
- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).
- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for ATLAS PCIe switch (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).
- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Fix spelling mistake 'OUSTANDING' -> 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).
- smb3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- sort patches to proper position
- squash patches.fixes/tcp-fix-fack_count-accounting-on-tcp_shift_skb_data.patch into patches.fixes/tcp-limit-payload-size-of-sacked-skbs.patch to match what stable backports do
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools: bpftool: fix infinite loop in map create (bsc#1109837).
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- typec: tcpm: fix compiler warning about stupid things (git-fixes).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- usb: serial: fix initial-termios handling (bsc#1135642).
- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).
- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/cpufeatures: Enumerate user wait instructions (jsc#SLE-5187).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/umwait: Add sysfs interface to control umwait C0.2 state (jsc#SLE-5187).
- x86/umwait: Add sysfs interface to control umwait maximum time (jsc#SLE-5187).
- x86/umwait: Initialize umwait control values (jsc#SLE-5187).
- xdp: check device pointer before clearing (bsc#1109837).
- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).
Patchnames
openSUSE-2019-1757
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-10638: A device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575).\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n- CVE-2019-13233: In arch/x86/lib/insn-eval.c there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).\n- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-10126: A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory corruption and possibly other consequences (bnc#1136935).\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1133738).\n- CVE-2019-12817: arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel for powerpc has a bug where unrelated processes may be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected (bnc#1138263).\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel. There was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- ACPICA: Clear status of GPEs on first direct enable (bsc#1111666).\n- ACPI: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- ACPI: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bpf, devmap: Add missing bulk queue free (bsc#1109837).\n- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).\n- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).\n- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).\n- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).\n- bpf: sockmap fix msg-\u003esg.size account on ingress skb (bsc#1109837).\n- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).\n- bpf: sockmap remove duplicate queue free (bsc#1109837).\n- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- ceph: factor out ceph_lookup_inode() (bsc#1138681).\n- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).\n- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).\n- ceph: quota: fix quota subdir mounts (bsc#1138681).\n- ceph: remove duplicated filelock ref increase (bsc#1138681).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- Documentation/ABI: Document umwait control sysfs interfaces (jsc#SLE-5187).\n- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base/devres: introduce devm_release_action() (bsc#1103992).\n- drivers/base/devres: introduce devm_release_action() (bsc#1103992 FATE#326009).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).\n- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).\n- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).\n- drm/fb-helper: generic: Do not take module ref for fbcon (bsc#1111666).\n- drm: Fix drm_release() and device unplug (bsc#1111666).\n- drm/i915: Add new AML_ULX support list (jsc#SLE-4986).\n- drm/i915: Add new ICL PCI ID (jsc#SLE-4986).\n- drm/i915/aml: Add new Amber Lake PCI ID (jsc#SLE-4986).\n- drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).\n- drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).\n- drm/i915/cfl: Adding another PCI Device ID (jsc#SLE-4986).\n- drm/i915/cml: Add CML PCI IDS (jsc#SLE-4986).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).\n- drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).\n- drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).\n- drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).\n- drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).\n- drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).\n- drm/i915: Split some PCI ids into separate groups (jsc#SLE-4986).\n- drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).\n- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).\n- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).\n- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).\n- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).\n- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).\n- fs: hugetlbfs: fix hwpoison reserve accounting (bsc#1139712) \n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).\n- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).\n- hwmon: (k10temp) Add support for family 17h (FATE#327735).\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).\n- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).\n- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).\n- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).\n- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).\n- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).\n- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).\n- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).\n- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).\n- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).\n- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).\n- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).\n- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685 FATE#325854).\n- IB/hfi1: Create inline to get extended headers (bsc#1114685 FATE#325854).\n- IB/hfi1: Validate fault injection opcode user input (bsc#1114685 FATE#325854).\n- IB/mlx5: Verify DEVX general object type correctly (bsc#1103991 FATE#326007).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).\n- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).\n- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).\n- kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 FATE#327056).\n- kabi workaround for asus-wmi changes (bsc#1051510).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- kvm: x86: fix return value for reserved EFER (bsc#1140992).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: preallocate message data items (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897). This feature was requested for SLE15 but aws reverted in packaging and master.\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).\n- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).\n- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).\n- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).\n- mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).\n- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).\n- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).\n- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).\n- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).\n- mmc: core: complete HS400 before checking status (bsc#1111666).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992 FATE#326009).\n- mm: fix race on soft-offlining free huge pages (bsc#1139712). \n- mm: hugetlb: delete dequeue_hwpoisoned_huge_page() (bsc#1139712). \n- mm: hugetlb: prevent reuse of hwpoisoned free hugepages (bsc#1139712). \n- mm: hugetlb: soft-offline: dissolve_free_huge_page() return zero on !PageHuge (bsc#bsc#1139712). \n- mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (bsc#1139712). \n- mm: hugetlb: soft_offline: save compound page order before page migration (bsc#1139712) \n- mm: hwpoison: change PageHWPoison behavior on hugetlb pages (bsc#1139712). \n- mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (bsc#1139712). \n- mm: hwpoison: introduce idenfity_page_state (bsc#1139712). \n- mm: hwpoison: introduce memory_failure_hugetlb() (bsc#1139712). \n- mm/page_alloc.c: avoid potential NULL pointer dereference (git fixes (mm/pagealloc)).\n- mm/page_alloc.c: fix never set ALLOC_NOFRAGMENT flag (git fixes (mm/pagealloc)).\n- mm: soft-offline: close the race against page allocation (bsc#1139712). \n- mm: soft-offline: dissolve free hugepage if soft-offlined (bsc#1139712). \n- mm: soft-offline: return -EBUSY if set_hwpoison_free_buddy_page() fails (bsc#1139712). \n- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- net: core: support XDP generic on stacked devices (bsc#1109837).\n- net: do not clear sock-\u003esk early to avoid trouble in strparser (bsc#1103990 FATE#326006).\n- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).\n- net: ena: add good checksum counter (bsc#1138879).\n- net: ena: add handling of llq max tx burst size (bsc#1138879).\n- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).\n- net: ena: add newline at the end of pr_err prints (bsc#1138879).\n- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).\n- net: ena: allow automatic fallback to polling mode (bsc#1138879).\n- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).\n- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).\n- net: ena: enable negotiating larger Rx ring size (bsc#1138879).\n- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).\n- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).\n- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).\n- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).\n- net: ena: fix incorrect test of supported hash function (bsc#1138879).\n- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).\n- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).\n- net: ena: gcc 8: fix compilation warning (bsc#1138879).\n- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).\n- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).\n- net: ena: optimise calculations for CQ doorbell (bsc#1138879).\n- net: ena: remove inline keyword from functions in *.c (bsc#1138879).\n- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).\n- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).\n- net: ena: use dev_info_once instead of static variable (bsc#1138879).\n- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).\n- net: Fix missing meta data in skb with vlan packet (bsc#1109837).\n- net/mlx5: Avoid reloading already removed devices (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990 FATE#326006).\n- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 FATE#326006).\n- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).\n- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 FATE#326006).\n- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990 FATE#326006).\n- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 FATE#326006).\n- net/mlx5: Set completion EQs as shared resources (bsc#1103991 FATE#326007).\n- net/mlx5: Update pci error handler entries and command translation (bsc#1103991 FATE#326007).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113 FATE#326472).\n- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).\n- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).\n- net/tls: avoid NULL pointer deref on nskb-\u003esk in fallback (bsc#1109837).\n- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).\n- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).\n- net/tls: do not copy negative amounts of data in reencrypt (bsc#1109837).\n- net/tls: do not ignore netdev notifications if no TLS features (bsc#1109837).\n- net/tls: do not leak IV and record seq when offload fails (bsc#1109837).\n- net/tls: do not leak partially sent record in device mode (bsc#1109837).\n- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).\n- net/tls: fix copy to fragments in reencrypt (bsc#1109837).\n- net/tls: fix page double free on TX cleanup (bsc#1109837).\n- net/tls: fix refcount adjustment in fallback (bsc#1109837).\n- net/tls: fix state removal with feature flags off (bsc#1109837).\n- net/tls: fix the IV leaks (bsc#1109837).\n- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).\n- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).\n- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).\n- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).\n- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).\n- nl80211: fix station_info pertid memory leak (bsc#1051510).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).\n- pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803 FATE#327056).\n- pci: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803).\n- pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803 FATE#327056).\n- pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803).\n- pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803 FATE#327056).\n- pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992).\n- pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992 FATE#326009).\n- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- pinctrl/amd: add get_direction handler (bsc#1140463).\n- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).\n- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).\n- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).\n- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).\n- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).\n- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).\n- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).\n- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).\n- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).\n- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).\n- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).\n- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).\n- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).\n- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).\n- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).\n- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).\n- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).\n- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).\n- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).\n- platform/x86: mlx-platform: Remove unused define (bsc#1112374).\n- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).\n- PM: ACPI/PCI: Resume all devices during hibernation (bsc#1111666).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- ppc64le: enable CONFIG_PPC_DT_CPU_FTRS (jsc#SLE-7159).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- ptrace: Fix -$gt;ptracer_cred handling for PTRACE_TRACEME (git-fixes).\n- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n- pwm: stm32: Use 3 cells -\u003eof_xlate() (bsc#1111666).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- RAS/CEC: Fix binary search function (bsc#1114279).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992).\n- rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992 FATE#326009).\n- rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991).\n- rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991 FATE#326007).\n- rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991).\n- rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991 FATE#326007).\n- rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992).\n- rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992 FATE#326009).\n- Refresh patches.fixes/scsi-Introduce-scsi_start_queue.patch (bsc#1119532).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- Replace the bluetooth fix with the upstream commit (bsc#1135556)\n- Reshuffle patches to match series_sort.py\n- Revert \u0027net: ena: ethtool: add extra properties retrieval via get_priv_flags\u0027 (bsc#1138879).\n- Revert \u0027net/mlx5e: Enable reporting checksum unnecessary also for L3 packets\u0027 (bsc#1103990).\n- Revert \u0027net/mlx5e: Enable reporting checksum unnecessary also for L3 packets\u0027 (bsc#1103990 FATE#326006).\n- Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template ()\u0027\u0027\n- Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027 This broke the build with older gcc instead.\n- Revert \u0027Sign non-x86 kernels when possible (boo#1134303)\u0027 This reverts commit bac621c6704610562ebd9e74ae5ad85ca8025681. We do not have reports of this working with all ARM architectures in all cases (boot, kexec, ..) so revert for now.\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- rpm/package-descriptions: fix typo in kernel-azure\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/pci: improve bar check (jsc#SLE-5803).\n- s390/pci: improve bar check (jsc#SLE-5803 FATE#327056).\n- s390/pci: map IOV resources (jsc#SLE-5803).\n- s390/pci: map IOV resources (jsc#SLE-5803 FATE#327056).\n- s390/pci: skip VF scanning (jsc#SLE-5803).\n- s390/pci: skip VF scanning (jsc#SLE-5803 FATE#327056).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n- scripts/git_sort/git_sort.py: drop old scsi branches\n- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).\n- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: fix spelling mistake \u0027Retreiving\u0027 -gt; \u0027Retrieving\u0027 (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: Remove set but not used variable \u0027pln\u0027 (jsc#SLE-4679 bsc#1136343).\n- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).\n- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).\n- scsi: megaraid_sas: correct an info message (bsc#1136271).\n- scsi: megaraid_sas: driver version update (bsc#1136271).\n- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).\n- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).\n- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).\n- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).\n- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for ATLAS PCIe switch (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 -\u003e \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n- smb3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- sort patches to proper position\n- squash patches.fixes/tcp-fix-fack_count-accounting-on-tcp_shift_skb_data.patch into patches.fixes/tcp-limit-payload-size-of-sacked-skbs.patch to match what stable backports do\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools: bpftool: fix infinite loop in map create (bsc#1109837).\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- typec: tcpm: fix compiler warning about stupid things (git-fixes).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- usb: serial: fix initial-termios handling (bsc#1135642).\n- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).\n- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/cpufeatures: Enumerate user wait instructions (jsc#SLE-5187).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/umwait: Add sysfs interface to control umwait C0.2 state (jsc#SLE-5187).\n- x86/umwait: Add sysfs interface to control umwait maximum time (jsc#SLE-5187).\n- x86/umwait: Initialize umwait control values (jsc#SLE-5187).\n- xdp: check device pointer before clearing (bsc#1109837).\n- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-1757", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1757-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:1757-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:1757-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1125703", "url": "https://bugzilla.suse.com/1125703" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1130836", "url": "https://bugzilla.suse.com/1130836" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135897", "url": "https://bugzilla.suse.com/1135897" }, { "category": "self", "summary": "SUSE Bug 1136156", "url": "https://bugzilla.suse.com/1136156" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136161", "url": "https://bugzilla.suse.com/1136161" }, { "category": "self", "summary": "SUSE Bug 1136264", "url": "https://bugzilla.suse.com/1136264" }, { "category": "self", "summary": "SUSE Bug 1136271", "url": "https://bugzilla.suse.com/1136271" }, { "category": "self", "summary": "SUSE Bug 1136333", "url": "https://bugzilla.suse.com/1136333" }, { "category": "self", "summary": "SUSE Bug 1136343", "url": "https://bugzilla.suse.com/1136343" }, { "category": "self", "summary": "SUSE Bug 1136462", "url": "https://bugzilla.suse.com/1136462" }, { "category": "self", "summary": "SUSE Bug 1136935", "url": "https://bugzilla.suse.com/1136935" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137985", "url": "https://bugzilla.suse.com/1137985" }, { "category": "self", "summary": "SUSE Bug 1138263", "url": "https://bugzilla.suse.com/1138263" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138681", "url": "https://bugzilla.suse.com/1138681" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1138732", "url": "https://bugzilla.suse.com/1138732" }, { "category": "self", "summary": "SUSE Bug 1138879", "url": "https://bugzilla.suse.com/1138879" }, { "category": "self", "summary": "SUSE Bug 1139712", "url": "https://bugzilla.suse.com/1139712" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140228", "url": "https://bugzilla.suse.com/1140228" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140454", "url": "https://bugzilla.suse.com/1140454" }, { "category": "self", "summary": "SUSE Bug 1140463", "url": "https://bugzilla.suse.com/1140463" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10126 page", "url": "https://www.suse.com/security/cve/CVE-2019-10126/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12817 page", "url": "https://www.suse.com/security/cve/CVE-2019-12817/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13233 page", "url": "https://www.suse.com/security/cve/CVE-2019-13233/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-20T06:26:39Z", "generator": { "date": "2019-07-20T06:26:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:1757-1", "initial_release_date": "2019-07-20T06:26:39Z", "revision_history": [ { "date": "2019-07-20T06:26:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.10.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.10.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.10.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.10.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.10.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.10.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.10.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.10.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.10.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.10.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.10.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.10.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.10.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.10.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.10.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.10.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.10.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.10.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2019-10126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10126" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10126", "url": "https://www.suse.com/security/cve/CVE-2019-10126" }, { "category": "external", "summary": "SUSE Bug 1136935 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1136935" }, { "category": "external", "summary": "SUSE Bug 1137944 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1137944" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "important" } ], "title": "CVE-2019-10126" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12817" } ], "notes": [ { "category": "general", "text": "arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12817", "url": "https://www.suse.com/security/cve/CVE-2019-12817" }, { "category": "external", "summary": "SUSE Bug 1138263 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138263" }, { "category": "external", "summary": "SUSE Bug 1138264 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "important" } ], "title": "CVE-2019-12817" }, { "cve": "CVE-2019-13233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13233" } ], "notes": [ { "category": "general", "text": "In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13233", "url": "https://www.suse.com/security/cve/CVE-2019-13233" }, { "category": "external", "summary": "SUSE Bug 1140454 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1140454" }, { "category": "external", "summary": "SUSE Bug 1144502 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1144502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.10.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.10.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-20T06:26:39Z", "details": "low" } ], "title": "CVE-2019-13233" } ] }
opensuse-su-2019:1716-1
Vulnerability from csaf_opensuse
Published
2019-07-19 06:01
Modified
2019-07-19 06:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.0 was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-10638: A device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575).
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).
- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-10126: A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences (bnc#1136935).
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c where there was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2018-16871: A flaw was found in NFS where an attacker who is able to mount an exported NFS filesystem was able to trigger a null pointer dereference by an invalid NFS sequence. (bnc#1137103).
The following non-security bugs were fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- added De0-Nanos-SoC board support (and others based on Altera SOC).
- Add sample kernel-default-base spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- Add sample kernel-default-base spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- af_key: unconditionally clone on broadcast (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- dm, dax: Fix detection of DAX support (bsc#1139782).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).
- Do not provide kernel-default-srchash from kernel-default-base.
- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).
- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).
- hwmon: (k10temp) Add support for family 17h (FATE#327735).
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).
- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).
- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).
- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).
- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).
- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).
- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).
- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).
- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- Install extra rpm scripts for kernel subpackaging (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- Install extra rpm scripts for kernel subpackaging (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- kabi fixup blk_mq_register_dev() (bsc#1140637).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- ras/CEC: Convert the timer callback to a workqueue (bsc#1114279).
- ras/CEC: Fix binary search function (bsc#1114279).
- Refresh patches.fixes/scsi-Introduce-scsi_start_queue.patch (bsc#1119532).
- Remove the previous subpackage infrastructure. This partially reverts commit 9b3ca32c11854156b2f950ff5e26131377d8445e ('Add kernel-subpackage-build.spec (FATE#326579).')
- Replace the bluetooth fix with the upstream commit (bsc#1135556)
- Revert 'Drop multiversion(kernel) from the KMP template ()' (bsc#1109137).
- Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)' (bsc#1109137). This reverts commit 71504d805c1340f68715ad41958e5ef35da2c351.
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).'
- Revert 'KMPs: provide and conflict a kernel version specific KMP name'
- Revert 'Revert 'Drop multiversion(kernel) from the KMP template ()''
- Revert 'Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)'' This feature was requested for SLE15 but aws reverted in packaging and master.
- Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).'
- Revert 'Sign non-x86 kernels when possible (boo#1134303)' This reverts commit bac621c6704610562ebd9e74ae5ad85ca8025681.
- Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).
- rpm: Add arm64 dtb-allwinner subpackage 4.10 added arch/arm64/boot/dts/allwinner/.
- rpm: Add arm64 dtb-zte subpackage 4.9 added arch/arm64/boot/dts/zte/.
- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).
- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).
- rpm/kernel-subpackage-build: handle arm kernel zImage.
- rpm/kernel-subpackage-spec: only provide firmware actually present in subpackage.
- rpm/package-descriptions: fix typo in kernel-azure
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.
- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- smb3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- Trim build dependencies of sample subpackage spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- Trim build dependencies of sample subpackage spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- usb: serial: fix initial-termios handling (bsc#1135642).
- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- x86/amd_nb: Add support for Raven Ridge CPUs ().
- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).
- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
Patchnames
openSUSE-2019-1716
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.0 was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-10638: A device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575).\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-10126: A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences (bnc#1136935).\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c where there was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2018-16871: A flaw was found in NFS where an attacker who is able to mount an exported NFS filesystem was able to trigger a null pointer dereference by an invalid NFS sequence. (bnc#1137103).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- added De0-Nanos-SoC board support (and others based on Altera SOC).\n- Add sample kernel-default-base spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- Add sample kernel-default-base spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dm, dax: Fix detection of DAX support (bsc#1139782).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not provide kernel-default-srchash from kernel-default-base.\n- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).\n- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).\n- hwmon: (k10temp) Add support for family 17h (FATE#327735).\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).\n- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).\n- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).\n- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).\n- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).\n- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).\n- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).\n- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).\n- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- Install extra rpm scripts for kernel subpackaging (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- Install extra rpm scripts for kernel subpackaging (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- ras/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- ras/CEC: Fix binary search function (bsc#1114279).\n- Refresh patches.fixes/scsi-Introduce-scsi_start_queue.patch (bsc#1119532).\n- Remove the previous subpackage infrastructure. This partially reverts commit 9b3ca32c11854156b2f950ff5e26131377d8445e (\u0027Add kernel-subpackage-build.spec (FATE#326579).\u0027)\n- Replace the bluetooth fix with the upstream commit (bsc#1135556)\n- Revert \u0027Drop multiversion(kernel) from the KMP template ()\u0027 (bsc#1109137).\n- Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027 (bsc#1109137). This reverts commit 71504d805c1340f68715ad41958e5ef35da2c351.\n- Revert \u0027KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\u0027\n- Revert \u0027KMPs: provide and conflict a kernel version specific KMP name\u0027\n- Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template ()\u0027\u0027\n- Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027\u0027 This feature was requested for SLE15 but aws reverted in packaging and master.\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027\n- Revert \u0027Sign non-x86 kernels when possible (boo#1134303)\u0027 This reverts commit bac621c6704610562ebd9e74ae5ad85ca8025681.\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- rpm: Add arm64 dtb-allwinner subpackage 4.10 added arch/arm64/boot/dts/allwinner/.\n- rpm: Add arm64 dtb-zte subpackage 4.9 added arch/arm64/boot/dts/zte/.\n- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).\n- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).\n- rpm/kernel-subpackage-build: handle arm kernel zImage.\n- rpm/kernel-subpackage-spec: only provide firmware actually present in subpackage.\n- rpm/package-descriptions: fix typo in kernel-azure\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- smb3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- Trim build dependencies of sample subpackage spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- Trim build dependencies of sample subpackage spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- usb: serial: fix initial-termios handling (bsc#1135642).\n- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- x86/amd_nb: Add support for Raven Ridge CPUs ().\n- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).\n- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-1716", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1716-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:1716-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:1716-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1106751", "url": "https://bugzilla.suse.com/1106751" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1124167", "url": "https://bugzilla.suse.com/1124167" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1128910", "url": "https://bugzilla.suse.com/1128910" }, { "category": "self", "summary": "SUSE Bug 1131645", "url": "https://bugzilla.suse.com/1131645" }, { "category": "self", "summary": "SUSE Bug 1132154", "url": "https://bugzilla.suse.com/1132154" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136935", "url": "https://bugzilla.suse.com/1136935" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139782", "url": "https://bugzilla.suse.com/1139782" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10126 page", "url": "https://www.suse.com/security/cve/CVE-2019-10126/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-19T06:01:10Z", "generator": { "date": "2019-07-19T06:01:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:1716-1", "initial_release_date": "2019-07-19T06:01:10Z", "revision_history": [ { "date": "2019-07-19T06:01:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp150.12.67.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp150.12.67.1.noarch", "product_id": "kernel-devel-4.12.14-lp150.12.67.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp150.12.67.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp150.12.67.1.noarch", "product_id": "kernel-docs-4.12.14-lp150.12.67.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp150.12.67.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp150.12.67.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp150.12.67.1.noarch", "product_id": "kernel-macros-4.12.14-lp150.12.67.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp150.12.67.1.noarch", "product": { "name": "kernel-source-4.12.14-lp150.12.67.1.noarch", "product_id": "kernel-source-4.12.14-lp150.12.67.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-debug-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-default-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-syms-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp150.12.67.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp150.12.67.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp150.12.67.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp150.12.67.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp150.12.67.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp150.12.67.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp150.12.67.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp150.12.67.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp150.12.67.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-19T06:01:10Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-19T06:01:10Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2019-10126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10126" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10126", "url": "https://www.suse.com/security/cve/CVE-2019-10126" }, { "category": "external", "summary": "SUSE Bug 1136935 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1136935" }, { "category": "external", "summary": "SUSE Bug 1137944 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1137944" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-19T06:01:10Z", "details": "important" } ], "title": "CVE-2019-10126" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-19T06:01:10Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-19T06:01:10Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-19T06:01:10Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.67.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.67.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-19T06:01:10Z", "details": "moderate" } ], "title": "CVE-2019-12614" } ] }
gsd-2018-16871
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-16871", "description": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "id": "GSD-2018-16871", "references": [ "https://www.suse.com/security/cve/CVE-2018-16871.html", "https://access.redhat.com/errata/RHSA-2020:1769", "https://access.redhat.com/errata/RHSA-2020:1567", "https://access.redhat.com/errata/RHSA-2020:0740", "https://access.redhat.com/errata/RHSA-2019:2730", "https://access.redhat.com/errata/RHSA-2019:2696", "https://access.redhat.com/errata/RHSA-2019:1891", "https://access.redhat.com/errata/RHSA-2019:1873", "https://linux.oracle.com/cve/CVE-2018-16871.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-16871" ], "details": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "id": "GSD-2018-16871", "modified": "2023-12-13T01:22:26.335314Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16871", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel:", "version": { "version_data": [ { "version_affected": "=", "version_value": "all 3.x, all 4.x up to 4.20" } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-476", "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/errata/RHSA-2019:2696", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "name": "https://access.redhat.com/errata/RHSA-2019:2730", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "name": "https://access.redhat.com/errata/RHSA-2020:0740", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871" }, { "name": "https://security.netapp.com/advisory/ntap-20211004-0002/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20211004-0002/" }, { "name": "https://support.f5.com/csp/article/K18657134", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K18657134" }, { "name": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.20", "versionStartIncluding": "3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16871" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871" }, { "name": "RHSA-2019:2696", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "name": "RHSA-2019:2730", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "name": "https://support.f5.com/csp/article/K18657134", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K18657134" }, { "name": "RHSA-2020:0740", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "name": "https://security.netapp.com/advisory/ntap-20211004-0002/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211004-0002/" }, { "name": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS", "refsource": "MISC", "tags": [], "url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-12T23:32Z", "publishedDate": "2019-07-30T17:15Z" } } }
ghsa-h4fx-7429-jvf7
Vulnerability from github
Published
2022-05-24 16:51
Modified
2022-05-24 16:51
Severity ?
VLAI Severity ?
Details
A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
{ "affected": [], "aliases": [ "CVE-2018-16871" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-30T17:15:00Z", "severity": "HIGH" }, "details": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "id": "GHSA-h4fx-7429-jvf7", "modified": "2022-05-24T16:51:41Z", "published": "2022-05-24T16:51:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:1873" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:1891" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20211004-0002" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K18657134" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp;utm_medium=RSS" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2018-16871
Vulnerability from fkie_nvd
Published
2019-07-30 17:15
Modified
2024-11-21 03:53
Severity ?
Summary
A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:2696 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:2730 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2020:0740 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20211004-0002/ | Third Party Advisory | |
secalert@redhat.com | https://support.f5.com/csp/article/K18657134 | Third Party Advisory | |
secalert@redhat.com | https://support.f5.com/csp/article/K18657134?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2696 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2730 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0740 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20211004-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K18657134 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K18657134?utm_source=f5support&%3Butm_medium=RSS |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
redhat | developer_tools | 1.0 | |
redhat | mrg_realtime | 2.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_eus | 7.4 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.4 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_workstation | 7.0 | |
netapp | cloud_backup | - | |
netapp | h410c_firmware | - | |
netapp | h410c | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h300e_firmware | - | |
netapp | h300e | - | |
netapp | h500e_firmware | - | |
netapp | h500e | - | |
netapp | h700e_firmware | - | |
netapp | h700e | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC830F9C-B39B-46E9-8544-573950D04576", "versionEndIncluding": "4.20", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "60937D60-6B78-400F-8D30-7FCF328659A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AFB0FFE3-4BE1-4024-BCC6-1B87074DE2E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "108A2215-50FB-4074-94CF-C130FA14566D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32F0B6C0-F930-480D-962B-3F4EFDCC13C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "803BC414-B250-4E3A-A478-A3881340D6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en la implementaci\u00f3n de NFS del kernel de Linux, todas las versiones 3.x y todas las versiones 4.x hasta 4.20. Un atacante, capaz de montar un sistema de archivos NFS exportado, es capaz de desencadenar una desreferencia de puntero null mediante el uso de una secuencia NFS no v\u00e1lida. Esto puede poner en p\u00e1nico a la m\u00e1quina y negar el acceso al servidor NFS. Se perder\u00e1n todas las escrituras de disco pendientes en el servidor NFS." } ], "id": "CVE-2018-16871", "lastModified": "2024-11-21T03:53:29.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-30T17:15:12.187", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211004-0002/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K18657134" }, { "source": "secalert@redhat.com", "url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211004-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K18657134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…