Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-20784 (GCVE-0-2018-20784)
Vulnerability from cvelistv5
Published
2019-02-22 15:00
Modified
2024-08-05 12:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:12:27.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2" }, { "name": "RHSA-2019:1959", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "name": "RHSA-2019:1971", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "name": "USN-4115-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4118-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "USN-4211-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4211-2/" }, { "name": "USN-4211-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4211-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-10T01:06:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2" }, { "name": "RHSA-2019:1959", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "name": "RHSA-2019:1971", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "name": "USN-4115-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4118-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "USN-4211-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4211-2/" }, { "name": "USN-4211-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4211-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20784", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2" }, { "name": "RHSA-2019:1959", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "name": "RHSA-2019:1971", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "name": "USN-4115-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "USN-4211-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4211-2/" }, { "name": "USN-4211-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4211-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20784", "datePublished": "2019-02-22T15:00:00", "dateReserved": "2019-02-22T00:00:00", "dateUpdated": "2024-08-05T12:12:27.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-20784\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-02-22T15:29:00.237\",\"lastModified\":\"2024-11-21T04:02:10.097\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, en versiones anteriores a la 4.20.2, kernel/sched/fair.c gestiona leaf cfs_rq de manera incorrecta, lo que permite que los atacantes provoquen una denegaci\u00f3n de servicio (bucle infinito en update_blocked_averages) o, posiblemente, otro impacto sin especificar induciendo una carga alta.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.13\",\"versionEndExcluding\":\"4.14.93\",\"matchCriteriaId\":\"8C6AA6D9-6073-4F71-8AF8-5F2828D88398\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19\",\"versionEndExcluding\":\"4.19.15\",\"matchCriteriaId\":\"7E5568CD-D4BA-4C72-AC99-A0D2E7112EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"4.20.2\",\"matchCriteriaId\":\"22A4B1AF-0AE6-45BB-847A-470D03904BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F099C8-DC7F-48C6-AAF8-C0DBFFD49620\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF9BCF3-187F-410A-96CA-9C47D3ED6924\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1959\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1971\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4115-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4211-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4211-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1971\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4115-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4211-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4211-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2022:2082-1
Vulnerability from csaf_suse
Published
2022-06-14 19:07
Modified
2022-06-14 19:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.12.31 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm's module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)
- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)
The following non-security bugs were fixed:
- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
- vmbus: do not return values for uninitalized channels (bsc#1051510 bsc#1198997).
- vt: vt_ioctl: fix race in VT_RESIZEX (bsc#1199785).
- x86/hyperv: Read TSC frequency from a synthetic MSR (bsc#1198962).
- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).
Patchnames
HPE-Helion-OpenStack-8-2022-2082,SUSE-2022-2082,SUSE-OpenStack-Cloud-8-2022-2082,SUSE-OpenStack-Cloud-Crowbar-8-2022-2082,SUSE-SLE-HA-12-SP3-2022-2082,SUSE-SLE-SAP-12-SP3-2022-2082,SUSE-SLE-SERVER-12-SP3-2022-2082,SUSE-SLE-SERVER-12-SP3-BCL-2022-2082
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 3.12.31 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).\n- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm\u0027s module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)\n- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).\n- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)\n\nThe following non-security bugs were fixed:\n\n- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).\n- vmbus: do not return values for uninitalized channels (bsc#1051510 bsc#1198997).\n- vt: vt_ioctl: fix race in VT_RESIZEX (bsc#1199785).\n- x86/hyperv: Read TSC frequency from a synthetic MSR (bsc#1198962).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2022-2082,SUSE-2022-2082,SUSE-OpenStack-Cloud-8-2022-2082,SUSE-OpenStack-Cloud-Crowbar-8-2022-2082,SUSE-SLE-HA-12-SP3-2022-2082,SUSE-SLE-SAP-12-SP3-2022-2082,SUSE-SLE-SERVER-12-SP3-2022-2082,SUSE-SLE-SERVER-12-SP3-BCL-2022-2082", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2082-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2082-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222082-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2082-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055710", "url": "https://bugzilla.suse.com/1055710" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1084513", "url": "https://bugzilla.suse.com/1084513" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1126703", "url": "https://bugzilla.suse.com/1126703" }, { "category": "self", "summary": "SUSE Bug 1158266", "url": "https://bugzilla.suse.com/1158266" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1182171", "url": "https://bugzilla.suse.com/1182171" }, { "category": "self", "summary": "SUSE Bug 1183646", "url": "https://bugzilla.suse.com/1183646" }, { "category": "self", "summary": "SUSE Bug 1183723", "url": "https://bugzilla.suse.com/1183723" }, { "category": "self", "summary": "SUSE Bug 1187055", "url": "https://bugzilla.suse.com/1187055" }, { "category": "self", "summary": "SUSE Bug 1191647", "url": "https://bugzilla.suse.com/1191647" }, { "category": "self", "summary": "SUSE Bug 1195651", "url": "https://bugzilla.suse.com/1195651" }, { "category": "self", "summary": "SUSE Bug 1196426", "url": "https://bugzilla.suse.com/1196426" }, { "category": "self", "summary": "SUSE Bug 1197343", "url": "https://bugzilla.suse.com/1197343" }, { "category": "self", "summary": "SUSE Bug 1198031", "url": "https://bugzilla.suse.com/1198031" }, { "category": "self", "summary": "SUSE Bug 1198032", "url": "https://bugzilla.suse.com/1198032" }, { "category": "self", "summary": "SUSE Bug 1198516", "url": "https://bugzilla.suse.com/1198516" }, { "category": "self", "summary": "SUSE Bug 1198577", "url": "https://bugzilla.suse.com/1198577" }, { "category": "self", "summary": "SUSE Bug 1198660", "url": "https://bugzilla.suse.com/1198660" }, { "category": "self", "summary": "SUSE Bug 1198687", "url": "https://bugzilla.suse.com/1198687" }, { "category": "self", "summary": "SUSE Bug 1198742", "url": "https://bugzilla.suse.com/1198742" }, { "category": "self", "summary": "SUSE Bug 1198962", "url": "https://bugzilla.suse.com/1198962" }, { "category": "self", "summary": "SUSE Bug 1198997", "url": "https://bugzilla.suse.com/1198997" }, { "category": "self", "summary": "SUSE Bug 1199012", "url": "https://bugzilla.suse.com/1199012" }, { "category": "self", "summary": "SUSE Bug 1199063", "url": "https://bugzilla.suse.com/1199063" }, { "category": "self", "summary": "SUSE Bug 1199314", "url": "https://bugzilla.suse.com/1199314" }, { "category": "self", "summary": "SUSE Bug 1199426", "url": "https://bugzilla.suse.com/1199426" }, { "category": "self", "summary": "SUSE Bug 1199505", "url": "https://bugzilla.suse.com/1199505" }, { "category": "self", "summary": "SUSE Bug 1199507", "url": "https://bugzilla.suse.com/1199507" }, { "category": "self", "summary": "SUSE Bug 1199605", "url": "https://bugzilla.suse.com/1199605" }, { "category": "self", "summary": "SUSE Bug 1199650", "url": "https://bugzilla.suse.com/1199650" }, { "category": "self", "summary": "SUSE Bug 1199785", "url": "https://bugzilla.suse.com/1199785" }, { "category": "self", "summary": "SUSE Bug 1200143", "url": "https://bugzilla.suse.com/1200143" }, { "category": "self", "summary": "SUSE Bug 1200144", "url": "https://bugzilla.suse.com/1200144" }, { "category": "self", "summary": "SUSE Bug 1200249", "url": "https://bugzilla.suse.com/1200249" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13695 page", "url": "https://www.suse.com/security/cve/CVE-2017-13695/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20784 page", "url": "https://www.suse.com/security/cve/CVE-2018-20784/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7755 page", "url": "https://www.suse.com/security/cve/CVE-2018-7755/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19377 page", "url": "https://www.suse.com/security/cve/CVE-2019-19377/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20292 page", "url": "https://www.suse.com/security/cve/CVE-2021-20292/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20321 page", "url": "https://www.suse.com/security/cve/CVE-2021-20321/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28688 page", "url": "https://www.suse.com/security/cve/CVE-2021-28688/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33061 page", "url": "https://www.suse.com/security/cve/CVE-2021-33061/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38208 page", "url": "https://www.suse.com/security/cve/CVE-2021-38208/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1011 page", "url": "https://www.suse.com/security/cve/CVE-2022-1011/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1184 page", "url": "https://www.suse.com/security/cve/CVE-2022-1184/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1353 page", "url": "https://www.suse.com/security/cve/CVE-2022-1353/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1419 page", "url": "https://www.suse.com/security/cve/CVE-2022-1419/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1516 page", "url": "https://www.suse.com/security/cve/CVE-2022-1516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1652 page", "url": "https://www.suse.com/security/cve/CVE-2022-1652/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1734 page", "url": "https://www.suse.com/security/cve/CVE-2022-1734/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1974 page", "url": "https://www.suse.com/security/cve/CVE-2022-1974/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1975 page", "url": "https://www.suse.com/security/cve/CVE-2022-1975/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21123 page", "url": "https://www.suse.com/security/cve/CVE-2022-21123/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21125 page", "url": "https://www.suse.com/security/cve/CVE-2022-21125/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21127 page", "url": "https://www.suse.com/security/cve/CVE-2022-21127/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21166 page", "url": "https://www.suse.com/security/cve/CVE-2022-21166/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21180 page", "url": "https://www.suse.com/security/cve/CVE-2022-21180/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21499 page", "url": "https://www.suse.com/security/cve/CVE-2022-21499/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-30594 page", "url": "https://www.suse.com/security/cve/CVE-2022-30594/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-06-14T19:07:39Z", "generator": { "date": "2022-06-14T19:07:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2082-1", "initial_release_date": "2022-06-14T19:07:39Z", "revision_history": [ { "date": "2022-06-14T19:07:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.164.3.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.164.3.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.164.3.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.164.3.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.164.3.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.164.3.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-default-4.4.180-94.164.3.aarch64", "product_id": "kernel-default-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.164.3.aarch64", "product_id": "kernel-default-base-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.164.3.aarch64", "product_id": "kernel-default-devel-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.164.3.aarch64", "product_id": "kernel-default-extra-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.164.3.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.164.3.aarch64", "product_id": "kernel-obs-build-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.164.3.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.164.2.aarch64", "product": { "name": "kernel-syms-4.4.180-94.164.2.aarch64", "product_id": "kernel-syms-4.4.180-94.164.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.164.3.aarch64", "product_id": "kernel-vanilla-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.164.3.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.164.3.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.164.3.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.164.3.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.164.3.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.164.3.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.164.3.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.164.3.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.164.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.164.2.noarch", "product": { "name": "kernel-devel-4.4.180-94.164.2.noarch", "product_id": "kernel-devel-4.4.180-94.164.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.164.2.noarch", "product": { "name": "kernel-macros-4.4.180-94.164.2.noarch", "product_id": "kernel-macros-4.4.180-94.164.2.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.164.2.noarch", "product": { "name": "kernel-source-4.4.180-94.164.2.noarch", "product_id": "kernel-source-4.4.180-94.164.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.164.2.noarch", "product": { "name": "kernel-docs-4.4.180-94.164.2.noarch", "product_id": "kernel-docs-4.4.180-94.164.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.164.2.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.164.2.noarch", "product_id": "kernel-docs-html-4.4.180-94.164.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.164.2.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.164.2.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.164.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.164.2.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.164.2.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.164.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.164.3.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.164.3.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.164.3.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.164.3.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.164.3.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.164.3.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.164.3.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.164.3.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.164.3.ppc64le", "product_id": "kernel-debug-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.164.3.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.164.3.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.164.3.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.164.3.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-default-4.4.180-94.164.3.ppc64le", "product_id": "kernel-default-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.164.3.ppc64le", "product_id": "kernel-default-base-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.164.3.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.164.3.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.164.3.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.164.3.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.164.2.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.164.2.ppc64le", "product_id": "kernel-syms-4.4.180-94.164.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.164.3.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.164.3.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.164.3.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.164.3.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "product_id": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.164.3.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.164.3.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.164.3.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.164.3.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.164.3.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.164.3.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.164.3.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.164.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.164.3.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.164.3.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.164.3.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.164.3.s390x", "product_id": "dlm-kmp-default-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.164.3.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.164.3.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.164.3.s390x", "product": { "name": "kernel-default-4.4.180-94.164.3.s390x", "product_id": "kernel-default-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.164.3.s390x", "product": { "name": "kernel-default-base-4.4.180-94.164.3.s390x", "product_id": "kernel-default-base-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.164.3.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.164.3.s390x", "product_id": "kernel-default-devel-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.164.3.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.164.3.s390x", "product_id": "kernel-default-extra-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.164.3.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.164.3.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.164.3.s390x", "product": { "name": "kernel-default-man-4.4.180-94.164.3.s390x", "product_id": "kernel-default-man-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.164.3.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.164.3.s390x", "product_id": "kernel-obs-build-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.164.3.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.164.3.s390x", "product_id": "kernel-obs-qa-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.164.2.s390x", "product": { "name": "kernel-syms-4.4.180-94.164.2.s390x", "product_id": "kernel-syms-4.4.180-94.164.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.164.3.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.164.3.s390x", "product_id": "kernel-vanilla-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.164.3.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.164.3.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.164.3.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.164.3.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.164.3.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.164.3.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.164.3.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.164.3.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.164.3.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.164.3.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.164.3.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.164.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-default-4.4.180-94.164.3.x86_64", "product_id": "kernel-default-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.164.3.x86_64", "product_id": "kernel-default-base-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.164.3.x86_64", "product_id": "kernel-default-devel-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.164.3.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.164.2.x86_64", "product": { "name": "kernel-syms-4.4.180-94.164.2.x86_64", "product_id": "kernel-syms-4.4.180-94.164.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "product_id": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.164.3.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.164.3.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.164.3.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.164.3.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.164.3.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.164.3.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.164.3.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.164.3.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.164.3.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.164.3.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-debug-4.4.180-94.164.3.x86_64", "product_id": "kernel-debug-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.164.3.x86_64", "product_id": "kernel-debug-base-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.164.3.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.164.3.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.164.3.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.164.3.x86_64", "product_id": "kernel-default-extra-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.164.3.x86_64", "product_id": "kernel-obs-build-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.164.3.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.164.3.x86_64", "product_id": "kernel-vanilla-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.164.3.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.164.3.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.164.3.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.164.3.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.164.3.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.164.3.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.164.3.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.164.3.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.164.3.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.164.3.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.164.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.164.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.164.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-devel-4.4.180-94.164.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.164.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-macros-4.4.180-94.164.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.164.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-source-4.4.180-94.164.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.164.2.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.164.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.164.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-devel-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.164.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-macros-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.164.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-source-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.164.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.164.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.164.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-devel-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.164.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-macros-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.164.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-source-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.164.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.164.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.164.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.164.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.164.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.164.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.164.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.164.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.164.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-devel-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-macros-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-source-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.164.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.164.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64" }, "product_reference": "kernel-default-4.4.180-94.164.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x" }, "product_reference": "kernel-default-4.4.180-94.164.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.164.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.164.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.164.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-devel-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-macros-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-source-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.164.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.164.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x" }, "product_reference": "kernel-syms-4.4.180-94.164.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.164.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.164.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.164.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-devel-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-macros-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.164.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch" }, "product_reference": "kernel-source-4.4.180-94.164.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.164.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.164.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13695" } ], "notes": [ { "category": "general", "text": "The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13695", "url": "https://www.suse.com/security/cve/CVE-2017-13695" }, { "category": "external", "summary": "SUSE Bug 1055710 for CVE-2017-13695", "url": "https://bugzilla.suse.com/1055710" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13695", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "low" } ], "title": "CVE-2017-13695" }, { "cve": "CVE-2018-20784", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20784" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20784", "url": "https://www.suse.com/security/cve/CVE-2018-20784" }, { "category": "external", "summary": "SUSE Bug 1126703 for CVE-2018-20784", "url": "https://bugzilla.suse.com/1126703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2018-20784" }, { "cve": "CVE-2018-7755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7755" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7755", "url": "https://www.suse.com/security/cve/CVE-2018-7755" }, { "category": "external", "summary": "SUSE Bug 1084513 for CVE-2018-7755", "url": "https://bugzilla.suse.com/1084513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "low" } ], "title": "CVE-2018-7755" }, { "cve": "CVE-2019-19377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19377" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19377", "url": "https://www.suse.com/security/cve/CVE-2019-19377" }, { "category": "external", "summary": "SUSE Bug 1158266 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1158266" }, { "category": "external", "summary": "SUSE Bug 1162338 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1162338" }, { "category": "external", "summary": "SUSE Bug 1162369 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1162369" }, { "category": "external", "summary": "SUSE Bug 1173871 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1173871" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2019-19377" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2021-20292", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20292" } ], "notes": [ { "category": "general", "text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20292", "url": "https://www.suse.com/security/cve/CVE-2021-20292" }, { "category": "external", "summary": "SUSE Bug 1183723 for CVE-2021-20292", "url": "https://bugzilla.suse.com/1183723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2021-20292" }, { "cve": "CVE-2021-20321", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20321" } ], "notes": [ { "category": "general", "text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20321", "url": "https://www.suse.com/security/cve/CVE-2021-20321" }, { "category": "external", "summary": "SUSE Bug 1191647 for CVE-2021-20321", "url": "https://bugzilla.suse.com/1191647" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2021-20321" }, { "cve": "CVE-2021-28688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28688" } ], "notes": [ { "category": "general", "text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28688", "url": "https://www.suse.com/security/cve/CVE-2021-28688" }, { "category": "external", "summary": "SUSE Bug 1183646 for CVE-2021-28688", "url": "https://bugzilla.suse.com/1183646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2021-28688" }, { "cve": "CVE-2021-33061", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33061" } ], "notes": [ { "category": "general", "text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33061", "url": "https://www.suse.com/security/cve/CVE-2021-33061" }, { "category": "external", "summary": "SUSE Bug 1196426 for CVE-2021-33061", "url": "https://bugzilla.suse.com/1196426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2021-33061" }, { "cve": "CVE-2021-38208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38208" } ], "notes": [ { "category": "general", "text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38208", "url": "https://www.suse.com/security/cve/CVE-2021-38208" }, { "category": "external", "summary": "SUSE Bug 1187055 for CVE-2021-38208", "url": "https://bugzilla.suse.com/1187055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2021-38208" }, { "cve": "CVE-2022-1011", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1011" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1011", "url": "https://www.suse.com/security/cve/CVE-2022-1011" }, { "category": "external", "summary": "SUSE Bug 1197343 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1197343" }, { "category": "external", "summary": "SUSE Bug 1197344 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1197344" }, { "category": "external", "summary": "SUSE Bug 1198687 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1198687" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212322 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1212322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2022-1011" }, { "cve": "CVE-2022-1184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1184" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1184", "url": "https://www.suse.com/security/cve/CVE-2022-1184" }, { "category": "external", "summary": "SUSE Bug 1198577 for CVE-2022-1184", "url": "https://bugzilla.suse.com/1198577" }, { "category": "external", "summary": "SUSE Bug 1210859 for CVE-2022-1184", "url": "https://bugzilla.suse.com/1210859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1353" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1353", "url": "https://www.suse.com/security/cve/CVE-2022-1353" }, { "category": "external", "summary": "SUSE Bug 1198516 for CVE-2022-1353", "url": "https://bugzilla.suse.com/1198516" }, { "category": "external", "summary": "SUSE Bug 1212293 for CVE-2022-1353", "url": "https://bugzilla.suse.com/1212293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-1353" }, { "cve": "CVE-2022-1419", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1419" } ], "notes": [ { "category": "general", "text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1419", "url": "https://www.suse.com/security/cve/CVE-2022-1419" }, { "category": "external", "summary": "SUSE Bug 1198742 for CVE-2022-1419", "url": "https://bugzilla.suse.com/1198742" }, { "category": "external", "summary": "SUSE Bug 1201655 for CVE-2022-1419", "url": "https://bugzilla.suse.com/1201655" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-1419", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2022-1419" }, { "cve": "CVE-2022-1516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1516" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1516", "url": "https://www.suse.com/security/cve/CVE-2022-1516" }, { "category": "external", "summary": "SUSE Bug 1199012 for CVE-2022-1516", "url": "https://bugzilla.suse.com/1199012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-1516" }, { "cve": "CVE-2022-1652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1652" } ], "notes": [ { "category": "general", "text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1652", "url": "https://www.suse.com/security/cve/CVE-2022-1652" }, { "category": "external", "summary": "SUSE Bug 1199063 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1199063" }, { "category": "external", "summary": "SUSE Bug 1200057 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1200057" }, { "category": "external", "summary": "SUSE Bug 1200751 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1200751" }, { "category": "external", "summary": "SUSE Bug 1201034 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1201034" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212307 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1212307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2022-1652" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1734" } ], "notes": [ { "category": "general", "text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1734", "url": "https://www.suse.com/security/cve/CVE-2022-1734" }, { "category": "external", "summary": "SUSE Bug 1199605 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199605" }, { "category": "external", "summary": "SUSE Bug 1199606 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199606" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2022-1734" }, { "cve": "CVE-2022-1974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1974" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1974", "url": "https://www.suse.com/security/cve/CVE-2022-1974" }, { "category": "external", "summary": "SUSE Bug 1200144 for CVE-2022-1974", "url": "https://bugzilla.suse.com/1200144" }, { "category": "external", "summary": "SUSE Bug 1200265 for CVE-2022-1974", "url": "https://bugzilla.suse.com/1200265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1975" } ], "notes": [ { "category": "general", "text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1975", "url": "https://www.suse.com/security/cve/CVE-2022-1975" }, { "category": "external", "summary": "SUSE Bug 1200143 for CVE-2022-1975", "url": "https://bugzilla.suse.com/1200143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-1975" }, { "cve": "CVE-2022-21123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21123" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21123", "url": "https://www.suse.com/security/cve/CVE-2022-21123" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209075 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1209075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-21123" }, { "cve": "CVE-2022-21125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21125" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21125", "url": "https://www.suse.com/security/cve/CVE-2022-21125" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209074 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1209074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21127" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21127", "url": "https://www.suse.com/security/cve/CVE-2022-21127" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21127", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21127", "url": "https://bugzilla.suse.com/1200549" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-21127" }, { "cve": "CVE-2022-21166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21166" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21166", "url": "https://www.suse.com/security/cve/CVE-2022-21166" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209073 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1209073" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21180" } ], "notes": [ { "category": "general", "text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21180", "url": "https://www.suse.com/security/cve/CVE-2022-21180" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1212313 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1212313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-21180" }, { "cve": "CVE-2022-21499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21499" } ], "notes": [ { "category": "general", "text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21499", "url": "https://www.suse.com/security/cve/CVE-2022-21499" }, { "category": "external", "summary": "SUSE Bug 1199426 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1199426" }, { "category": "external", "summary": "SUSE Bug 1200059 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1200059" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1203034" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212315 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1212315" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2022-21499" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-30594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-30594" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-30594", "url": "https://www.suse.com/security/cve/CVE-2022-30594" }, { "category": "external", "summary": "SUSE Bug 1199505 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1199505" }, { "category": "external", "summary": "SUSE Bug 1199602 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1199602" }, { "category": "external", "summary": "SUSE Bug 1201549 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1201549" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.164.2.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.164.2.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.164.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.164.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.164.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.164.2.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.164.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_164-default-1-4.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T19:07:39Z", "details": "important" } ], "title": "CVE-2022-30594" } ] }
suse-su-2022:2077-1
Vulnerability from csaf_suse
Published
2022-06-14 18:28
Modified
2022-06-14 18:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated.
The following security bugs were fixed:
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).
- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm's module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)
The following non-security bugs were fixed:
- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).
Patchnames
SUSE-2022-2077,SUSE-SLE-SERVER-12-SP2-BCL-2022-2077
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP2 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).\n- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).\n- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).\n- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm\u0027s module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)\n- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)\n\nThe following non-security bugs were fixed:\n\n- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2077,SUSE-SLE-SERVER-12-SP2-BCL-2022-2077", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2077-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2077-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222077-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2077-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" }, { "category": "self", "summary": "SUSE Bug 1055710", "url": "https://bugzilla.suse.com/1055710" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1084513", "url": "https://bugzilla.suse.com/1084513" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1126703", "url": "https://bugzilla.suse.com/1126703" }, { "category": "self", "summary": "SUSE Bug 1158266", "url": "https://bugzilla.suse.com/1158266" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1182171", "url": "https://bugzilla.suse.com/1182171" }, { "category": "self", "summary": "SUSE Bug 1183646", "url": "https://bugzilla.suse.com/1183646" }, { "category": "self", "summary": "SUSE Bug 1183723", "url": "https://bugzilla.suse.com/1183723" }, { "category": "self", "summary": "SUSE Bug 1187055", "url": "https://bugzilla.suse.com/1187055" }, { "category": "self", "summary": "SUSE Bug 1191647", "url": "https://bugzilla.suse.com/1191647" }, { "category": "self", "summary": "SUSE Bug 1196426", "url": "https://bugzilla.suse.com/1196426" }, { "category": "self", "summary": "SUSE Bug 1197343", "url": "https://bugzilla.suse.com/1197343" }, { "category": "self", "summary": "SUSE Bug 1198031", "url": "https://bugzilla.suse.com/1198031" }, { "category": "self", "summary": "SUSE Bug 1198032", "url": "https://bugzilla.suse.com/1198032" }, { "category": "self", "summary": "SUSE Bug 1198516", "url": "https://bugzilla.suse.com/1198516" }, { "category": "self", "summary": "SUSE Bug 1198577", "url": "https://bugzilla.suse.com/1198577" }, { "category": "self", "summary": "SUSE Bug 1198660", "url": "https://bugzilla.suse.com/1198660" }, { "category": "self", "summary": "SUSE Bug 1198687", "url": "https://bugzilla.suse.com/1198687" }, { "category": "self", "summary": "SUSE Bug 1198742", "url": "https://bugzilla.suse.com/1198742" }, { "category": "self", "summary": "SUSE Bug 1199012", "url": "https://bugzilla.suse.com/1199012" }, { "category": "self", "summary": "SUSE Bug 1199063", "url": "https://bugzilla.suse.com/1199063" }, { "category": "self", "summary": "SUSE Bug 1199426", "url": "https://bugzilla.suse.com/1199426" }, { "category": "self", "summary": "SUSE Bug 1199505", "url": "https://bugzilla.suse.com/1199505" }, { "category": "self", "summary": "SUSE Bug 1199507", "url": "https://bugzilla.suse.com/1199507" }, { "category": "self", "summary": "SUSE Bug 1199605", "url": "https://bugzilla.suse.com/1199605" }, { "category": "self", "summary": "SUSE Bug 1199650", "url": "https://bugzilla.suse.com/1199650" }, { "category": "self", "summary": "SUSE Bug 1200143", "url": "https://bugzilla.suse.com/1200143" }, { "category": "self", "summary": "SUSE Bug 1200144", "url": "https://bugzilla.suse.com/1200144" }, { "category": "self", "summary": "SUSE Bug 1200249", "url": "https://bugzilla.suse.com/1200249" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13695 page", "url": "https://www.suse.com/security/cve/CVE-2017-13695/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20784 page", "url": "https://www.suse.com/security/cve/CVE-2018-20784/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7755 page", "url": "https://www.suse.com/security/cve/CVE-2018-7755/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19377 page", "url": "https://www.suse.com/security/cve/CVE-2019-19377/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20292 page", "url": "https://www.suse.com/security/cve/CVE-2021-20292/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20321 page", "url": "https://www.suse.com/security/cve/CVE-2021-20321/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28688 page", "url": "https://www.suse.com/security/cve/CVE-2021-28688/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33061 page", "url": "https://www.suse.com/security/cve/CVE-2021-33061/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38208 page", "url": "https://www.suse.com/security/cve/CVE-2021-38208/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1011 page", "url": "https://www.suse.com/security/cve/CVE-2022-1011/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1184 page", "url": "https://www.suse.com/security/cve/CVE-2022-1184/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1353 page", "url": "https://www.suse.com/security/cve/CVE-2022-1353/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1419 page", "url": "https://www.suse.com/security/cve/CVE-2022-1419/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1516 page", "url": "https://www.suse.com/security/cve/CVE-2022-1516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1652 page", "url": "https://www.suse.com/security/cve/CVE-2022-1652/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1734 page", "url": "https://www.suse.com/security/cve/CVE-2022-1734/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1974 page", "url": "https://www.suse.com/security/cve/CVE-2022-1974/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1975 page", "url": "https://www.suse.com/security/cve/CVE-2022-1975/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21123 page", "url": "https://www.suse.com/security/cve/CVE-2022-21123/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21125 page", "url": "https://www.suse.com/security/cve/CVE-2022-21125/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21127 page", "url": "https://www.suse.com/security/cve/CVE-2022-21127/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21166 page", "url": "https://www.suse.com/security/cve/CVE-2022-21166/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21180 page", "url": "https://www.suse.com/security/cve/CVE-2022-21180/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21499 page", "url": "https://www.suse.com/security/cve/CVE-2022-21499/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-30594 page", "url": "https://www.suse.com/security/cve/CVE-2022-30594/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-06-14T18:28:39Z", "generator": { "date": "2022-06-14T18:28:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2077-1", "initial_release_date": "2022-06-14T18:28:39Z", "revision_history": [ { "date": "2022-06-14T18:28:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.175.2.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.175.2.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.175.2.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.175.2.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.175.2.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.175.2.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.175.2.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.175.2.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.175.2.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.175.2.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.175.2.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.175.2.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.175.2.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.175.2.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.175.2.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.175.2.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-default-4.4.121-92.175.2.aarch64", "product_id": "kernel-default-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.175.2.aarch64", "product_id": "kernel-default-base-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.175.2.aarch64", "product_id": "kernel-default-devel-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.175.2.aarch64", "product_id": "kernel-default-extra-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.175.2.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.175.2.aarch64", "product_id": "kernel-obs-build-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.175.2.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-syms-4.4.121-92.175.2.aarch64", "product_id": "kernel-syms-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.175.2.aarch64", "product_id": "kernel-vanilla-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.175.2.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.175.2.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.175.2.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.175.2.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.175.2.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.175.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.175.2.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.175.2.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.175.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.175.2.noarch", "product": { "name": "kernel-devel-4.4.121-92.175.2.noarch", "product_id": "kernel-devel-4.4.121-92.175.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.175.2.noarch", "product": { "name": "kernel-docs-4.4.121-92.175.2.noarch", "product_id": "kernel-docs-4.4.121-92.175.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.175.2.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.175.2.noarch", "product_id": "kernel-docs-html-4.4.121-92.175.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.175.2.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.175.2.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.175.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.175.2.noarch", "product": { "name": "kernel-macros-4.4.121-92.175.2.noarch", "product_id": "kernel-macros-4.4.121-92.175.2.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.175.2.noarch", "product": { "name": "kernel-source-4.4.121-92.175.2.noarch", "product_id": "kernel-source-4.4.121-92.175.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.175.2.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.175.2.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.175.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.175.2.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.175.2.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.175.2.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.175.2.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.175.2.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.175.2.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.175.2.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.175.2.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.175.2.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.175.2.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.175.2.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.175.2.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.175.2.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.175.2.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.175.2.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.175.2.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.175.2.ppc64le", "product_id": "kernel-debug-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.175.2.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.175.2.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.175.2.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.175.2.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-default-4.4.121-92.175.2.ppc64le", "product_id": "kernel-default-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.175.2.ppc64le", "product_id": "kernel-default-base-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.175.2.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.175.2.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.175.2.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.175.2.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.175.2.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.175.2.ppc64le", "product_id": "kernel-syms-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.175.2.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.175.2.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.175.2.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.175.2.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.175.2.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.175.2.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.175.2.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.175.2.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.175.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.175.2.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.175.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.175.2.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.175.2.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.175.2.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.175.2.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.175.2.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.175.2.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.175.2.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.175.2.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.175.2.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.175.2.s390x", "product_id": "dlm-kmp-default-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.175.2.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.175.2.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.175.2.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.175.2.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.175.2.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.175.2.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.175.2.s390x", "product": { "name": "kernel-default-4.4.121-92.175.2.s390x", "product_id": "kernel-default-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.175.2.s390x", "product": { "name": "kernel-default-base-4.4.121-92.175.2.s390x", "product_id": "kernel-default-base-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.175.2.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.175.2.s390x", "product_id": "kernel-default-devel-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.175.2.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.175.2.s390x", "product_id": "kernel-default-extra-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.175.2.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.175.2.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.175.2.s390x", "product": { "name": "kernel-default-man-4.4.121-92.175.2.s390x", "product_id": "kernel-default-man-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.175.2.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.175.2.s390x", "product_id": "kernel-obs-build-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.175.2.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.175.2.s390x", "product_id": "kernel-obs-qa-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.175.2.s390x", "product": { "name": "kernel-syms-4.4.121-92.175.2.s390x", "product_id": "kernel-syms-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.175.2.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.175.2.s390x", "product_id": "kernel-vanilla-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.175.2.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.175.2.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.175.2.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.175.2.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.175.2.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.175.2.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.175.2.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.175.2.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.175.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.175.2.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.175.2.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.175.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.175.2.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.175.2.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.175.2.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.175.2.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.175.2.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.175.2.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.175.2.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.175.2.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.175.2.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.175.2.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.175.2.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.175.2.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.175.2.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.175.2.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.175.2.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.175.2.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.175.2.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.175.2.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.175.2.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.175.2.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.175.2.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.175.2.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.175.2.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.175.2.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-debug-4.4.121-92.175.2.x86_64", "product_id": "kernel-debug-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.175.2.x86_64", "product_id": "kernel-debug-base-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.175.2.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.175.2.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.175.2.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-default-4.4.121-92.175.2.x86_64", "product_id": "kernel-default-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.175.2.x86_64", "product_id": "kernel-default-base-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.175.2.x86_64", "product_id": "kernel-default-devel-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.175.2.x86_64", "product_id": "kernel-default-extra-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.175.2.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.175.2.x86_64", "product_id": "kernel-obs-build-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.175.2.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-syms-4.4.121-92.175.2.x86_64", "product_id": "kernel-syms-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.175.2.x86_64", "product_id": "kernel-vanilla-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.175.2.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.175.2.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.175.2.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.175.2.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.175.2.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.175.2.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.175.2.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.175.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.175.2.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.175.2.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.175.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.175.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64" }, "product_reference": "kernel-default-4.4.121-92.175.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.175.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.175.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.175.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.175.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.175.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch" }, "product_reference": "kernel-devel-4.4.121-92.175.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.175.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch" }, "product_reference": "kernel-macros-4.4.121-92.175.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.175.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch" }, "product_reference": "kernel-source-4.4.121-92.175.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.175.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.175.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13695" } ], "notes": [ { "category": "general", "text": "The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13695", "url": "https://www.suse.com/security/cve/CVE-2017-13695" }, { "category": "external", "summary": "SUSE Bug 1055710 for CVE-2017-13695", "url": "https://bugzilla.suse.com/1055710" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13695", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "low" } ], "title": "CVE-2017-13695" }, { "cve": "CVE-2018-20784", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20784" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20784", "url": "https://www.suse.com/security/cve/CVE-2018-20784" }, { "category": "external", "summary": "SUSE Bug 1126703 for CVE-2018-20784", "url": "https://bugzilla.suse.com/1126703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2018-20784" }, { "cve": "CVE-2018-7755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7755" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7755", "url": "https://www.suse.com/security/cve/CVE-2018-7755" }, { "category": "external", "summary": "SUSE Bug 1084513 for CVE-2018-7755", "url": "https://bugzilla.suse.com/1084513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "low" } ], "title": "CVE-2018-7755" }, { "cve": "CVE-2019-19377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19377" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19377", "url": "https://www.suse.com/security/cve/CVE-2019-19377" }, { "category": "external", "summary": "SUSE Bug 1158266 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1158266" }, { "category": "external", "summary": "SUSE Bug 1162338 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1162338" }, { "category": "external", "summary": "SUSE Bug 1162369 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1162369" }, { "category": "external", "summary": "SUSE Bug 1173871 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1173871" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2019-19377", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2019-19377" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2021-20292", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20292" } ], "notes": [ { "category": "general", "text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20292", "url": "https://www.suse.com/security/cve/CVE-2021-20292" }, { "category": "external", "summary": "SUSE Bug 1183723 for CVE-2021-20292", "url": "https://bugzilla.suse.com/1183723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2021-20292" }, { "cve": "CVE-2021-20321", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20321" } ], "notes": [ { "category": "general", "text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20321", "url": "https://www.suse.com/security/cve/CVE-2021-20321" }, { "category": "external", "summary": "SUSE Bug 1191647 for CVE-2021-20321", "url": "https://bugzilla.suse.com/1191647" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2021-20321" }, { "cve": "CVE-2021-28688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28688" } ], "notes": [ { "category": "general", "text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28688", "url": "https://www.suse.com/security/cve/CVE-2021-28688" }, { "category": "external", "summary": "SUSE Bug 1183646 for CVE-2021-28688", "url": "https://bugzilla.suse.com/1183646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2021-28688" }, { "cve": "CVE-2021-33061", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33061" } ], "notes": [ { "category": "general", "text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33061", "url": "https://www.suse.com/security/cve/CVE-2021-33061" }, { "category": "external", "summary": "SUSE Bug 1196426 for CVE-2021-33061", "url": "https://bugzilla.suse.com/1196426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2021-33061" }, { "cve": "CVE-2021-38208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38208" } ], "notes": [ { "category": "general", "text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38208", "url": "https://www.suse.com/security/cve/CVE-2021-38208" }, { "category": "external", "summary": "SUSE Bug 1187055 for CVE-2021-38208", "url": "https://bugzilla.suse.com/1187055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2021-38208" }, { "cve": "CVE-2022-1011", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1011" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1011", "url": "https://www.suse.com/security/cve/CVE-2022-1011" }, { "category": "external", "summary": "SUSE Bug 1197343 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1197343" }, { "category": "external", "summary": "SUSE Bug 1197344 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1197344" }, { "category": "external", "summary": "SUSE Bug 1198687 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1198687" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212322 for CVE-2022-1011", "url": "https://bugzilla.suse.com/1212322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2022-1011" }, { "cve": "CVE-2022-1184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1184" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1184", "url": "https://www.suse.com/security/cve/CVE-2022-1184" }, { "category": "external", "summary": "SUSE Bug 1198577 for CVE-2022-1184", "url": "https://bugzilla.suse.com/1198577" }, { "category": "external", "summary": "SUSE Bug 1210859 for CVE-2022-1184", "url": "https://bugzilla.suse.com/1210859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1353" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1353", "url": "https://www.suse.com/security/cve/CVE-2022-1353" }, { "category": "external", "summary": "SUSE Bug 1198516 for CVE-2022-1353", "url": "https://bugzilla.suse.com/1198516" }, { "category": "external", "summary": "SUSE Bug 1212293 for CVE-2022-1353", "url": "https://bugzilla.suse.com/1212293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-1353" }, { "cve": "CVE-2022-1419", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1419" } ], "notes": [ { "category": "general", "text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1419", "url": "https://www.suse.com/security/cve/CVE-2022-1419" }, { "category": "external", "summary": "SUSE Bug 1198742 for CVE-2022-1419", "url": "https://bugzilla.suse.com/1198742" }, { "category": "external", "summary": "SUSE Bug 1201655 for CVE-2022-1419", "url": "https://bugzilla.suse.com/1201655" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-1419", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2022-1419" }, { "cve": "CVE-2022-1516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1516" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1516", "url": "https://www.suse.com/security/cve/CVE-2022-1516" }, { "category": "external", "summary": "SUSE Bug 1199012 for CVE-2022-1516", "url": "https://bugzilla.suse.com/1199012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-1516" }, { "cve": "CVE-2022-1652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1652" } ], "notes": [ { "category": "general", "text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1652", "url": "https://www.suse.com/security/cve/CVE-2022-1652" }, { "category": "external", "summary": "SUSE Bug 1199063 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1199063" }, { "category": "external", "summary": "SUSE Bug 1200057 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1200057" }, { "category": "external", "summary": "SUSE Bug 1200751 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1200751" }, { "category": "external", "summary": "SUSE Bug 1201034 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1201034" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212307 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1212307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2022-1652" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1734" } ], "notes": [ { "category": "general", "text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1734", "url": "https://www.suse.com/security/cve/CVE-2022-1734" }, { "category": "external", "summary": "SUSE Bug 1199605 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199605" }, { "category": "external", "summary": "SUSE Bug 1199606 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199606" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2022-1734" }, { "cve": "CVE-2022-1974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1974" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1974", "url": "https://www.suse.com/security/cve/CVE-2022-1974" }, { "category": "external", "summary": "SUSE Bug 1200144 for CVE-2022-1974", "url": "https://bugzilla.suse.com/1200144" }, { "category": "external", "summary": "SUSE Bug 1200265 for CVE-2022-1974", "url": "https://bugzilla.suse.com/1200265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1975" } ], "notes": [ { "category": "general", "text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1975", "url": "https://www.suse.com/security/cve/CVE-2022-1975" }, { "category": "external", "summary": "SUSE Bug 1200143 for CVE-2022-1975", "url": "https://bugzilla.suse.com/1200143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-1975" }, { "cve": "CVE-2022-21123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21123" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21123", "url": "https://www.suse.com/security/cve/CVE-2022-21123" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209075 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1209075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-21123" }, { "cve": "CVE-2022-21125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21125" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21125", "url": "https://www.suse.com/security/cve/CVE-2022-21125" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209074 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1209074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21127" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21127", "url": "https://www.suse.com/security/cve/CVE-2022-21127" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21127", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21127", "url": "https://bugzilla.suse.com/1200549" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-21127" }, { "cve": "CVE-2022-21166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21166" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21166", "url": "https://www.suse.com/security/cve/CVE-2022-21166" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209073 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1209073" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21180" } ], "notes": [ { "category": "general", "text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21180", "url": "https://www.suse.com/security/cve/CVE-2022-21180" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1212313 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1212313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-21180" }, { "cve": "CVE-2022-21499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21499" } ], "notes": [ { "category": "general", "text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21499", "url": "https://www.suse.com/security/cve/CVE-2022-21499" }, { "category": "external", "summary": "SUSE Bug 1199426 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1199426" }, { "category": "external", "summary": "SUSE Bug 1200059 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1200059" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1203034" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212315 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1212315" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2022-21499" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-30594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-30594" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-30594", "url": "https://www.suse.com/security/cve/CVE-2022-30594" }, { "category": "external", "summary": "SUSE Bug 1199505 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1199505" }, { "category": "external", "summary": "SUSE Bug 1199602 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1199602" }, { "category": "external", "summary": "SUSE Bug 1201549 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1201549" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.175.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.175.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-14T18:28:39Z", "details": "important" } ], "title": "CVE-2022-30594" } ] }
suse-su-2023:2805-1
Vulnerability from csaf_suse
Published
2023-07-11 04:31
Modified
2023-07-11 04:31
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).
- CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).
The following non-security bugs were fixed:
- Do not sign the vanilla kernel (bsc#1209008).
- Drop dvb-core fix patch due to regression (bsc#1205758).
- Revert CVE-2018-20784 due to regression (bsc#1126703).
- binfmt_elf: Take the mmap lock when walking the VMA list (bsc#1209039 CVE-2023-1249).
- bluetooth: Fix double free in hci_conn_cleanup (bsc#1209052 CVE-2023-28464).
- bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (CVE-2023-1989 bsc#1210336).
- btrfs: fix race between quota disable and quota assign ioctls (CVE-2023-1611 bsc#1209687).
- do not fallthrough in cbq_classify and stop on TC_ACT_SHOT (bsc#1207036 CVE-2023-23454 bsc#1207125 CVE-2023-23455).
- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878 bsc#1211105 CVE-2023-2513).
- fbcon: Check font dimension limits (CVE-2023-3161 bsc#1212154).
- firewire: fix potential uaf in outbound_phy_packet_callback() (CVE-2023-3159 bsc#1212128).
- fix a mistake in the CVE-2023-0590 / bsc#1207795 backport
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (bsc#1210715 CVE-2023-2194).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- ipvlan:Fix out-of-bounds caused by unclear skb->cb (bsc#1212842 CVE-2023-3090).
- kernel/sys.c: fix potential Spectre v1 issue (bsc#1209256 CVE-2017-5753).
- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (bsc#1209532 CVE-2023-1513).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (bsc#1212501 CVE-2023-35824).
- media: dvb-core: Fix use-after-free due on race condition at dvb_net (CVE-2022-45886 bsc#1205760).
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() (CVE-2022-45884 bsc#1205756).
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (CVE-2022-45919 bsc#1205803).
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend (CVE-2022-45885 bsc#1205758).
- media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() (bsc#1209291 CVE-2023-28328).
- media: dvb_frontend: kABI workaround (CVE-2022-45885 bsc#1205758).
- media: dvb_net: kABI workaround (CVE-2022-45886 bsc#1205760).
- media: dvbdev: fix error logic at dvb_register_device() (CVE-2022-45884 bsc#1205756).
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (CVE-2023-1118 bsc#1208837).
- media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() (CVE-2022-45887 bsc#1205762).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (CVE-2023-3141 bsc#1212129 bsc#1211449).
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (bsc#1210940 CVE-2023-31436).
- netfilter: nf_tables: fix null deref due to zeroed list head (CVE-2023-1095 bsc#1208777).
- netrom: Fix use-after-free caused by accept on already connected socket (bsc#1211186 CVE-2023-32269).
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes bsc#1210337 CVE-2023-1990).
- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (CVE-2023-30772 bsc#1210329).
- prlimit: do_prlimit needs to have a speculation check (bsc#1209256 CVE-2017-5753).
- sched/rt: pick_next_rt_entity(): check list_entry (bsc#1208600 CVE-2023-1077).
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (bsc#1210647 CVE-2023-2162).
- seq_buf: Fix overflow in seq_buf_putmem_hex() (bsc#1209549 CVE-2023-28772).
- tcp: Fix data races around icsk->icsk_af_ops (bsc#1204405 CVE-2022-3566).
- tipc: fix NULL deref in tipc_link_xmit() (bsc#1209289 CVE-2023-1390).
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (bsc#1209287 CVE-2023-1380).
- x86/speculation: Allow enabling STIBP with legacy IBRS (bsc#1210506 CVE-2023-1998).
- xfs: verify buffer contents when we skip log replay (bsc#1210498 CVE-2023-2124).
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (bsc#1209871 CVE-2023-1670).
Patchnames
SUSE-2023-2805,SUSE-SLE-SERVER-12-SP2-BCL-2023-2805
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).\n- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).\n- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).\n- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).\n- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).\n- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).\n- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).\n- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).\n- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).\n- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).\n- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).\n- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715).\n- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).\n- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).\n- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).\n- CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).\n- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).\n- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).\n- CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).\n\nThe following non-security bugs were fixed:\n\n- Do not sign the vanilla kernel (bsc#1209008).\n- Drop dvb-core fix patch due to regression (bsc#1205758).\n- Revert CVE-2018-20784 due to regression (bsc#1126703).\n- binfmt_elf: Take the mmap lock when walking the VMA list (bsc#1209039 CVE-2023-1249).\n- bluetooth: Fix double free in hci_conn_cleanup (bsc#1209052 CVE-2023-28464).\n- bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (CVE-2023-1989 bsc#1210336).\n- btrfs: fix race between quota disable and quota assign ioctls (CVE-2023-1611 bsc#1209687).\n- do not fallthrough in cbq_classify and stop on TC_ACT_SHOT (bsc#1207036 CVE-2023-23454 bsc#1207125 CVE-2023-23455).\n- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).\n- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878 bsc#1211105 CVE-2023-2513).\n- fbcon: Check font dimension limits (CVE-2023-3161 bsc#1212154).\n- firewire: fix potential uaf in outbound_phy_packet_callback() (CVE-2023-3159 bsc#1212128).\n- fix a mistake in the CVE-2023-0590 / bsc#1207795 backport\n- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (bsc#1210715 CVE-2023-2194).\n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- ipvlan:Fix out-of-bounds caused by unclear skb-\u003ecb (bsc#1212842 CVE-2023-3090).\n- kernel/sys.c: fix potential Spectre v1 issue (bsc#1209256 CVE-2017-5753).\n- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (bsc#1209532 CVE-2023-1513).\n- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (bsc#1212501 CVE-2023-35824).\n- media: dvb-core: Fix use-after-free due on race condition at dvb_net (CVE-2022-45886 bsc#1205760).\n- media: dvb-core: Fix use-after-free due to race at dvb_register_device() (CVE-2022-45884 bsc#1205756).\n- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (CVE-2022-45919 bsc#1205803).\n- media: dvb-core: Fix use-after-free on race condition at dvb_frontend (CVE-2022-45885 bsc#1205758).\n- media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() (bsc#1209291 CVE-2023-28328).\n- media: dvb_frontend: kABI workaround (CVE-2022-45885 bsc#1205758).\n- media: dvb_net: kABI workaround (CVE-2022-45886 bsc#1205760).\n- media: dvbdev: fix error logic at dvb_register_device() (CVE-2022-45884 bsc#1205756).\n- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (CVE-2023-1118 bsc#1208837).\n- media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() (CVE-2022-45887 bsc#1205762).\n- memstick: r592: Fix UAF bug in r592_remove due to race condition (CVE-2023-3141 bsc#1212129 bsc#1211449).\n- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (bsc#1210940 CVE-2023-31436).\n- netfilter: nf_tables: fix null deref due to zeroed list head (CVE-2023-1095 bsc#1208777).\n- netrom: Fix use-after-free caused by accept on already connected socket (bsc#1211186 CVE-2023-32269).\n- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes bsc#1210337 CVE-2023-1990).\n- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (CVE-2023-30772 bsc#1210329).\n- prlimit: do_prlimit needs to have a speculation check (bsc#1209256 CVE-2017-5753).\n- sched/rt: pick_next_rt_entity(): check list_entry (bsc#1208600 CVE-2023-1077).\n- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (bsc#1210647 CVE-2023-2162).\n- seq_buf: Fix overflow in seq_buf_putmem_hex() (bsc#1209549 CVE-2023-28772).\n- tcp: Fix data races around icsk-\u003eicsk_af_ops (bsc#1204405 CVE-2022-3566).\n- tipc: fix NULL deref in tipc_link_xmit() (bsc#1209289 CVE-2023-1390).\n- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (bsc#1209287 CVE-2023-1380).\n- x86/speculation: Allow enabling STIBP with legacy IBRS (bsc#1210506 CVE-2023-1998).\n- xfs: verify buffer contents when we skip log replay (bsc#1210498 CVE-2023-2124).\n- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (bsc#1209871 CVE-2023-1670).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2805,SUSE-SLE-SERVER-12-SP2-BCL-2023-2805", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2805-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2805-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232805-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2805-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" }, { "category": "self", "summary": "SUSE Bug 1126703", "url": "https://bugzilla.suse.com/1126703" }, { "category": "self", "summary": "SUSE Bug 1204405", "url": "https://bugzilla.suse.com/1204405" }, { "category": "self", "summary": "SUSE Bug 1205756", "url": "https://bugzilla.suse.com/1205756" }, { "category": "self", "summary": "SUSE Bug 1205758", "url": "https://bugzilla.suse.com/1205758" }, { "category": "self", "summary": "SUSE Bug 1205760", "url": "https://bugzilla.suse.com/1205760" }, { "category": "self", "summary": "SUSE Bug 1205762", "url": "https://bugzilla.suse.com/1205762" }, { "category": "self", "summary": "SUSE Bug 1205803", "url": "https://bugzilla.suse.com/1205803" }, { "category": "self", "summary": "SUSE Bug 1206878", "url": "https://bugzilla.suse.com/1206878" }, { "category": "self", "summary": "SUSE Bug 1207036", "url": "https://bugzilla.suse.com/1207036" }, { "category": "self", "summary": "SUSE Bug 1207125", "url": "https://bugzilla.suse.com/1207125" }, { "category": "self", "summary": "SUSE Bug 1207168", "url": "https://bugzilla.suse.com/1207168" }, { "category": "self", "summary": "SUSE Bug 1207795", "url": "https://bugzilla.suse.com/1207795" }, { "category": "self", "summary": "SUSE Bug 1208600", "url": "https://bugzilla.suse.com/1208600" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208837", "url": "https://bugzilla.suse.com/1208837" }, { "category": "self", "summary": "SUSE Bug 1209008", "url": "https://bugzilla.suse.com/1209008" }, { "category": "self", "summary": "SUSE Bug 1209039", "url": "https://bugzilla.suse.com/1209039" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209287", "url": "https://bugzilla.suse.com/1209287" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209687", "url": "https://bugzilla.suse.com/1209687" }, { "category": "self", "summary": "SUSE Bug 1209871", "url": "https://bugzilla.suse.com/1209871" }, { "category": "self", "summary": "SUSE Bug 1210329", "url": "https://bugzilla.suse.com/1210329" }, { "category": "self", "summary": "SUSE Bug 1210336", "url": "https://bugzilla.suse.com/1210336" }, { "category": "self", "summary": "SUSE Bug 1210337", "url": "https://bugzilla.suse.com/1210337" }, { "category": "self", "summary": "SUSE Bug 1210498", "url": "https://bugzilla.suse.com/1210498" }, { "category": "self", "summary": "SUSE Bug 1210506", "url": "https://bugzilla.suse.com/1210506" }, { "category": "self", "summary": "SUSE Bug 1210647", "url": "https://bugzilla.suse.com/1210647" }, { "category": "self", "summary": "SUSE Bug 1210715", "url": "https://bugzilla.suse.com/1210715" }, { "category": "self", "summary": "SUSE Bug 1210940", "url": "https://bugzilla.suse.com/1210940" }, { "category": "self", "summary": "SUSE Bug 1211105", "url": "https://bugzilla.suse.com/1211105" }, { "category": "self", "summary": "SUSE Bug 1211186", "url": "https://bugzilla.suse.com/1211186" }, { "category": "self", "summary": "SUSE Bug 1211449", "url": "https://bugzilla.suse.com/1211449" }, { "category": "self", "summary": "SUSE Bug 1212128", "url": "https://bugzilla.suse.com/1212128" }, { "category": "self", "summary": "SUSE Bug 1212129", "url": "https://bugzilla.suse.com/1212129" }, { "category": "self", "summary": "SUSE Bug 1212154", "url": "https://bugzilla.suse.com/1212154" }, { "category": "self", "summary": "SUSE Bug 1212501", "url": "https://bugzilla.suse.com/1212501" }, { "category": "self", "summary": "SUSE Bug 1212842", "url": "https://bugzilla.suse.com/1212842" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20784 page", "url": "https://www.suse.com/security/cve/CVE-2018-20784/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3566 page", "url": "https://www.suse.com/security/cve/CVE-2022-3566/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45884 page", "url": "https://www.suse.com/security/cve/CVE-2022-45884/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45885 page", "url": "https://www.suse.com/security/cve/CVE-2022-45885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45886 page", "url": "https://www.suse.com/security/cve/CVE-2022-45886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45887 page", "url": "https://www.suse.com/security/cve/CVE-2022-45887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45919 page", "url": "https://www.suse.com/security/cve/CVE-2022-45919/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0590 page", "url": "https://www.suse.com/security/cve/CVE-2023-0590/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1077 page", "url": "https://www.suse.com/security/cve/CVE-2023-1077/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1118 page", "url": "https://www.suse.com/security/cve/CVE-2023-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1249 page", "url": "https://www.suse.com/security/cve/CVE-2023-1249/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1380 page", "url": "https://www.suse.com/security/cve/CVE-2023-1380/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1611 page", "url": "https://www.suse.com/security/cve/CVE-2023-1611/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1670 page", "url": "https://www.suse.com/security/cve/CVE-2023-1670/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1989 page", "url": "https://www.suse.com/security/cve/CVE-2023-1989/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1990 page", "url": "https://www.suse.com/security/cve/CVE-2023-1990/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1998 page", "url": "https://www.suse.com/security/cve/CVE-2023-1998/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2162 page", "url": "https://www.suse.com/security/cve/CVE-2023-2162/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2194 page", "url": "https://www.suse.com/security/cve/CVE-2023-2194/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23454 page", "url": "https://www.suse.com/security/cve/CVE-2023-23454/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2513 page", "url": "https://www.suse.com/security/cve/CVE-2023-2513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-30772 page", "url": "https://www.suse.com/security/cve/CVE-2023-30772/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3090 page", "url": "https://www.suse.com/security/cve/CVE-2023-3090/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3141 page", "url": "https://www.suse.com/security/cve/CVE-2023-3141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3159 page", "url": "https://www.suse.com/security/cve/CVE-2023-3159/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3161 page", "url": "https://www.suse.com/security/cve/CVE-2023-3161/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-32269 page", "url": "https://www.suse.com/security/cve/CVE-2023-32269/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-35824 page", "url": "https://www.suse.com/security/cve/CVE-2023-35824/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-07-11T04:31:55Z", "generator": { "date": "2023-07-11T04:31:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2805-1", "initial_release_date": "2023-07-11T04:31:55Z", "revision_history": [ { "date": "2023-07-11T04:31:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.205.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.205.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.205.1.aarch64", "product_id": "kernel-syms-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.205.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.205.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.205.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.205.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.205.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.205.1.noarch", "product_id": "kernel-devel-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.205.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.205.1.noarch", "product_id": "kernel-docs-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.205.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.205.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.205.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.205.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.205.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.205.1.noarch", "product_id": "kernel-macros-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.205.1.noarch", "product": { "name": "kernel-source-4.4.121-92.205.1.noarch", "product_id": "kernel-source-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.205.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.205.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.205.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.205.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.205.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.205.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.205.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.205.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.205.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.205.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.205.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.205.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-4.4.121-92.205.1.s390x", "product_id": "kernel-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.205.1.s390x", "product_id": "kernel-default-base-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.205.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.205.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.205.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.205.1.s390x", "product_id": "kernel-default-man-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.205.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.205.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.205.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.205.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.205.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.205.1.s390x", "product_id": "kernel-syms-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.205.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.205.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.205.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.205.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.205.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.205.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.205.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.205.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.205.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.205.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.205.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.205.1.x86_64", "product_id": "kernel-syms-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.205.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.205.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.205.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.205.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.205.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.205.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.205.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.205.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.205.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.205.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.205.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.205.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.205.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.205.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.205.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.205.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.205.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.205.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-20784", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20784" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20784", "url": "https://www.suse.com/security/cve/CVE-2018-20784" }, { "category": "external", "summary": "SUSE Bug 1126703 for CVE-2018-20784", "url": "https://bugzilla.suse.com/1126703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2018-20784" }, { "cve": "CVE-2022-3566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3566" } ], "notes": [ { "category": "general", "text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3566", "url": "https://www.suse.com/security/cve/CVE-2022-3566" }, { "category": "external", "summary": "SUSE Bug 1204405 for CVE-2022-3566", "url": "https://bugzilla.suse.com/1204405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-3566" }, { "cve": "CVE-2022-45884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45884", "url": "https://www.suse.com/security/cve/CVE-2022-45884" }, { "category": "external", "summary": "SUSE Bug 1205756 for CVE-2022-45884", "url": "https://bugzilla.suse.com/1205756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45885" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45885", "url": "https://www.suse.com/security/cve/CVE-2022-45885" }, { "category": "external", "summary": "SUSE Bug 1205758 for CVE-2022-45885", "url": "https://bugzilla.suse.com/1205758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45886" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45886", "url": "https://www.suse.com/security/cve/CVE-2022-45886" }, { "category": "external", "summary": "SUSE Bug 1205760 for CVE-2022-45886", "url": "https://bugzilla.suse.com/1205760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45887" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45887", "url": "https://www.suse.com/security/cve/CVE-2022-45887" }, { "category": "external", "summary": "SUSE Bug 1205762 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1205762" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45919" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45919", "url": "https://www.suse.com/security/cve/CVE-2022-45919" }, { "category": "external", "summary": "SUSE Bug 1205803 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1205803" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1208912 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208912" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2023-0590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0590" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0590", "url": "https://www.suse.com/security/cve/CVE-2023-0590" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207795 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207795" }, { "category": "external", "summary": "SUSE Bug 1207822 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207822" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-1077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1077" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1077", "url": "https://www.suse.com/security/cve/CVE-2023-1077" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2023-1077", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1208839 for CVE-2023-1077", "url": "https://bugzilla.suse.com/1208839" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1077", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1077", "url": "https://bugzilla.suse.com/1213842" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1118" } ], "notes": [ { "category": "general", "text": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1118", "url": "https://www.suse.com/security/cve/CVE-2023-1118" }, { "category": "external", "summary": "SUSE Bug 1208837 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1208837" }, { "category": "external", "summary": "SUSE Bug 1208910 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1208910" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1213842" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1249" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1249", "url": "https://www.suse.com/security/cve/CVE-2023-1249" }, { "category": "external", "summary": "SUSE Bug 1209039 for CVE-2023-1249", "url": "https://bugzilla.suse.com/1209039" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1249" }, { "cve": "CVE-2023-1380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1380" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1380", "url": "https://www.suse.com/security/cve/CVE-2023-1380" }, { "category": "external", "summary": "SUSE Bug 1209287 for CVE-2023-1380", "url": "https://bugzilla.suse.com/1209287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1611" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1611", "url": "https://www.suse.com/security/cve/CVE-2023-1611" }, { "category": "external", "summary": "SUSE Bug 1209687 for CVE-2023-1611", "url": "https://bugzilla.suse.com/1209687" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1670" } ], "notes": [ { "category": "general", "text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1670", "url": "https://www.suse.com/security/cve/CVE-2023-1670" }, { "category": "external", "summary": "SUSE Bug 1209871 for CVE-2023-1670", "url": "https://bugzilla.suse.com/1209871" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-1670", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1989" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1989", "url": "https://www.suse.com/security/cve/CVE-2023-1989" }, { "category": "external", "summary": "SUSE Bug 1210336 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1210336" }, { "category": "external", "summary": "SUSE Bug 1210500 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1210500" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1214128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1990" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1990", "url": "https://www.suse.com/security/cve/CVE-2023-1990" }, { "category": "external", "summary": "SUSE Bug 1210337 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1210337" }, { "category": "external", "summary": "SUSE Bug 1210501 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1210501" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1214128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1998" } ], "notes": [ { "category": "general", "text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1998", "url": "https://www.suse.com/security/cve/CVE-2023-1998" }, { "category": "external", "summary": "SUSE Bug 1210506 for CVE-2023-1998", "url": "https://bugzilla.suse.com/1210506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1998" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2162" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2162", "url": "https://www.suse.com/security/cve/CVE-2023-2162" }, { "category": "external", "summary": "SUSE Bug 1210647 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1210647" }, { "category": "external", "summary": "SUSE Bug 1210662 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1210662" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2194" } ], "notes": [ { "category": "general", "text": "An out-of-bounds write vulnerability was found in the Linux kernel\u0027s SLIMpro I2C device driver. The userspace \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2194", "url": "https://www.suse.com/security/cve/CVE-2023-2194" }, { "category": "external", "summary": "SUSE Bug 1210715 for CVE-2023-2194", "url": "https://bugzilla.suse.com/1210715" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-2194" }, { "cve": "CVE-2023-23454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23454" } ], "notes": [ { "category": "general", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23454", "url": "https://www.suse.com/security/cve/CVE-2023-23454" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207188 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207188" }, { "category": "external", "summary": "SUSE Bug 1208030 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208030" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1208085 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208085" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-2513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2513" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in the Linux kernel\u0027s ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2513", "url": "https://www.suse.com/security/cve/CVE-2023-2513" }, { "category": "external", "summary": "SUSE Bug 1211105 for CVE-2023-2513", "url": "https://bugzilla.suse.com/1211105" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-2513" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-28772" }, { "cve": "CVE-2023-30772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-30772" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-30772", "url": "https://www.suse.com/security/cve/CVE-2023-30772" }, { "category": "external", "summary": "SUSE Bug 1210329 for CVE-2023-30772", "url": "https://bugzilla.suse.com/1210329" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-30772" }, { "cve": "CVE-2023-3090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3090" } ], "notes": [ { "category": "general", "text": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb-\u003ecb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3090", "url": "https://www.suse.com/security/cve/CVE-2023-3090" }, { "category": "external", "summary": "SUSE Bug 1212842 for CVE-2023-3090", "url": "https://bugzilla.suse.com/1212842" }, { "category": "external", "summary": "SUSE Bug 1212849 for CVE-2023-3090", "url": "https://bugzilla.suse.com/1212849" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-3090", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1219701 for CVE-2023-3090", "url": "https://bugzilla.suse.com/1219701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-3090" }, { "cve": "CVE-2023-3141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3141" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3141", "url": "https://www.suse.com/security/cve/CVE-2023-3141" }, { "category": "external", "summary": "SUSE Bug 1212129 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1212129" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-31436" }, { "cve": "CVE-2023-3159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3159" } ], "notes": [ { "category": "general", "text": "A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3159", "url": "https://www.suse.com/security/cve/CVE-2023-3159" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1212128 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1212128" }, { "category": "external", "summary": "SUSE Bug 1212347 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1212347" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-3159" }, { "cve": "CVE-2023-3161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3161" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font-\u003ewidth and font-\u003eheight greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3161", "url": "https://www.suse.com/security/cve/CVE-2023-3161" }, { "category": "external", "summary": "SUSE Bug 1212154 for CVE-2023-3161", "url": "https://bugzilla.suse.com/1212154" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3161", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-3161" }, { "cve": "CVE-2023-32269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-32269" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-32269", "url": "https://www.suse.com/security/cve/CVE-2023-32269" }, { "category": "external", "summary": "SUSE Bug 1211186 for CVE-2023-32269", "url": "https://bugzilla.suse.com/1211186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-32269" }, { "cve": "CVE-2023-35824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-35824" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-35824", "url": "https://www.suse.com/security/cve/CVE-2023-35824" }, { "category": "external", "summary": "SUSE Bug 1212501 for CVE-2023-35824", "url": "https://bugzilla.suse.com/1212501" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-35824", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-35824" } ] }
suse-su-2023:3324-1
Vulnerability from csaf_suse
Published
2023-08-16 06:13
Modified
2023-08-16 06:13
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bsc#1126703).
- CVE-2018-3639: Fixed Speculative Store Bypass aka 'Memory Disambiguation' (bsc#1087082).
- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).
- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).
- CVE-2023-3106: Fixed crash in XFRM_MSG_GETSA netlink handler (bsc#1213251).
- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).
The following non-security bugs were fixed:
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
- ubi: ensure that VID header offset + VID header size <= alloc, size (bsc#1210584).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (git-fixes) No it's not git-fixes it's used to make sle12-sp2 compile with newer toolchain to make the life of all the poor souls maintaining this ancient kernel on their modern machines, a little bit easier....
Patchnames
SUSE-2023-3324,SUSE-SLE-SERVER-12-SP2-BCL-2023-3324
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bsc#1126703).\n- CVE-2018-3639: Fixed Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1087082).\n- CVE-2022-40982: Fixed transient execution attack called \u0027Gather Data Sampling\u0027 (bsc#1206418).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).\n- CVE-2023-20569: Fixed side channel attack \u2018Inception\u2019 or \u2018RAS Poisoning\u2019 (bsc#1213287).\n- CVE-2023-20593: Fixed a ZenBleed issue in \u0027Zen 2\u0027 CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).\n- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).\n- CVE-2023-3106: Fixed crash in XFRM_MSG_GETSA netlink handler (bsc#1213251).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n\nThe following non-security bugs were fixed:\n\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).\n- ubi: ensure that VID header offset + VID header size \u0026lt;= alloc, size (bsc#1210584).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (git-fixes) No it\u0027s not git-fixes it\u0027s used to make sle12-sp2 compile with newer toolchain to make the life of all the poor souls maintaining this ancient kernel on their modern machines, a little bit easier....\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3324,SUSE-SLE-SERVER-12-SP2-BCL-2023-3324", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3324-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:3324-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233324-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:3324-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1126703", "url": "https://bugzilla.suse.com/1126703" }, { "category": "self", "summary": "SUSE Bug 1206418", "url": "https://bugzilla.suse.com/1206418" }, { "category": "self", "summary": "SUSE Bug 1207561", "url": "https://bugzilla.suse.com/1207561" }, { "category": "self", "summary": "SUSE Bug 1209779", "url": "https://bugzilla.suse.com/1209779" }, { "category": "self", "summary": "SUSE Bug 1210584", "url": "https://bugzilla.suse.com/1210584" }, { "category": "self", "summary": "SUSE Bug 1211738", "url": "https://bugzilla.suse.com/1211738" }, { "category": "self", "summary": "SUSE Bug 1211867", "url": "https://bugzilla.suse.com/1211867" }, { "category": "self", "summary": "SUSE Bug 1212502", "url": "https://bugzilla.suse.com/1212502" }, { "category": "self", "summary": "SUSE Bug 1213059", "url": "https://bugzilla.suse.com/1213059" }, { "category": "self", "summary": "SUSE Bug 1213167", "url": "https://bugzilla.suse.com/1213167" }, { "category": "self", "summary": "SUSE Bug 1213251", "url": "https://bugzilla.suse.com/1213251" }, { "category": "self", "summary": "SUSE Bug 1213286", "url": "https://bugzilla.suse.com/1213286" }, { "category": "self", "summary": "SUSE Bug 1213287", "url": "https://bugzilla.suse.com/1213287" }, { "category": "self", "summary": "SUSE Bug 1213585", "url": "https://bugzilla.suse.com/1213585" }, { "category": "self", "summary": "SUSE Bug 1213588", "url": "https://bugzilla.suse.com/1213588" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20784 page", "url": "https://www.suse.com/security/cve/CVE-2018-20784/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0459 page", "url": "https://www.suse.com/security/cve/CVE-2023-0459/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1637 page", "url": "https://www.suse.com/security/cve/CVE-2023-1637/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20569 page", "url": "https://www.suse.com/security/cve/CVE-2023-20569/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2985 page", "url": "https://www.suse.com/security/cve/CVE-2023-2985/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3106 page", "url": "https://www.suse.com/security/cve/CVE-2023-3106/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3268 page", "url": "https://www.suse.com/security/cve/CVE-2023-3268/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-35001 page", "url": "https://www.suse.com/security/cve/CVE-2023-35001/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3567 page", "url": "https://www.suse.com/security/cve/CVE-2023-3567/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3611 page", "url": "https://www.suse.com/security/cve/CVE-2023-3611/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3776 page", "url": "https://www.suse.com/security/cve/CVE-2023-3776/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-08-16T06:13:06Z", "generator": { "date": "2023-08-16T06:13:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:3324-1", "initial_release_date": "2023-08-16T06:13:06Z", "revision_history": [ { "date": "2023-08-16T06:13:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.208.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.208.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.208.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.208.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.208.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.208.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.208.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.208.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.208.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.208.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.208.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.208.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.208.1.aarch64", "product_id": "kernel-default-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.208.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.208.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.208.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.208.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.208.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.208.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.208.1.aarch64", "product_id": "kernel-syms-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.208.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.208.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.208.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.208.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.208.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.208.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.208.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.208.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.208.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.208.1.noarch", "product_id": "kernel-devel-4.4.121-92.208.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.208.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.208.1.noarch", "product_id": "kernel-docs-4.4.121-92.208.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.208.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.208.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.208.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.208.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.208.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.208.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.208.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.208.1.noarch", "product_id": "kernel-macros-4.4.121-92.208.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.208.1.noarch", "product": { "name": "kernel-source-4.4.121-92.208.1.noarch", "product_id": "kernel-source-4.4.121-92.208.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.208.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.208.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.208.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.208.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.208.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.208.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.208.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.208.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.208.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.208.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.208.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.208.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.208.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.208.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.208.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.208.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.208.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.208.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.208.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.208.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.208.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.208.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.208.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.208.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.208.1.ppc64le", "product_id": "kernel-default-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.208.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.208.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.208.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.208.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.208.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.208.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.208.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.208.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.208.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.208.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.208.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.208.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.208.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.208.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.208.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.208.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.208.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.208.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.208.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.208.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.208.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.208.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.208.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.208.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.208.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.208.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.208.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.208.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.208.1.s390x", "product": { "name": "kernel-default-4.4.121-92.208.1.s390x", "product_id": "kernel-default-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.208.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.208.1.s390x", "product_id": "kernel-default-base-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.208.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.208.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.208.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.208.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.208.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.208.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.208.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.208.1.s390x", "product_id": "kernel-default-man-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.208.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.208.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.208.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.208.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.208.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.208.1.s390x", "product_id": "kernel-syms-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.208.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.208.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.208.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.208.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.208.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.208.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.208.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.208.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.208.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.208.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.208.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.208.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.208.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.208.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.208.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.208.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.208.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.208.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.208.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.208.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.208.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.208.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.208.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.208.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.208.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.208.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.208.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.208.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.208.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.208.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.208.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.208.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.208.1.x86_64", "product_id": "kernel-debug-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.208.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.208.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.208.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.208.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.208.1.x86_64", "product_id": "kernel-default-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.208.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.208.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.208.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.208.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.208.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.208.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.208.1.x86_64", "product_id": "kernel-syms-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.208.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.208.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.208.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.208.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.208.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.208.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.208.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.208.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.208.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.208.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.208.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.208.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.208.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.208.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.208.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.208.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.208.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.208.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.208.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.208.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.208.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.208.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.208.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.208.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20784", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20784" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20784", "url": "https://www.suse.com/security/cve/CVE-2018-20784" }, { "category": "external", "summary": "SUSE Bug 1126703 for CVE-2018-20784", "url": "https://bugzilla.suse.com/1126703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2018-20784" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2023-0459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0459" } ], "notes": [ { "category": "general", "text": "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0459", "url": "https://www.suse.com/security/cve/CVE-2023-0459" }, { "category": "external", "summary": "SUSE Bug 1211738 for CVE-2023-0459", "url": "https://bugzilla.suse.com/1211738" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-0459", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2023-0459" }, { "cve": "CVE-2023-1637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1637" } ], "notes": [ { "category": "general", "text": "A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1637", "url": "https://www.suse.com/security/cve/CVE-2023-1637" }, { "category": "external", "summary": "SUSE Bug 1209779 for CVE-2023-1637", "url": "https://bugzilla.suse.com/1209779" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2023-1637" }, { "cve": "CVE-2023-20569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20569" } ], "notes": [ { "category": "general", "text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20569", "url": "https://www.suse.com/security/cve/CVE-2023-20569" }, { "category": "external", "summary": "SUSE Bug 1213287 for CVE-2023-20569", "url": "https://bugzilla.suse.com/1213287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2023-20569" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-2985", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2985" } ], "notes": [ { "category": "general", "text": "A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2985", "url": "https://www.suse.com/security/cve/CVE-2023-2985" }, { "category": "external", "summary": "SUSE Bug 1211867 for CVE-2023-2985", "url": "https://bugzilla.suse.com/1211867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2023-2985" }, { "cve": "CVE-2023-3106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3106" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3106", "url": "https://www.suse.com/security/cve/CVE-2023-3106" }, { "category": "external", "summary": "SUSE Bug 1213251 for CVE-2023-3106", "url": "https://bugzilla.suse.com/1213251" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-3106", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2023-3106" }, { "cve": "CVE-2023-3268", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3268" } ], "notes": [ { "category": "general", "text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3268", "url": "https://www.suse.com/security/cve/CVE-2023-3268" }, { "category": "external", "summary": "SUSE Bug 1212502 for CVE-2023-3268", "url": "https://bugzilla.suse.com/1212502" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3268", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2023-3268" }, { "cve": "CVE-2023-35001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-35001" } ], "notes": [ { "category": "general", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-35001", "url": "https://www.suse.com/security/cve/CVE-2023-35001" }, { "category": "external", "summary": "SUSE Bug 1213059 for CVE-2023-35001", "url": "https://bugzilla.suse.com/1213059" }, { "category": "external", "summary": "SUSE Bug 1213063 for CVE-2023-35001", "url": "https://bugzilla.suse.com/1213063" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-35001", "url": "https://bugzilla.suse.com/1217531" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "important" } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-3567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3567" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3567", "url": "https://www.suse.com/security/cve/CVE-2023-3567" }, { "category": "external", "summary": "SUSE Bug 1213167 for CVE-2023-3567", "url": "https://bugzilla.suse.com/1213167" }, { "category": "external", "summary": "SUSE Bug 1213244 for CVE-2023-3567", "url": "https://bugzilla.suse.com/1213244" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-3567", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3567", "url": "https://bugzilla.suse.com/1215674" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-3567", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-3567", "url": "https://bugzilla.suse.com/1217531" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "important" } ], "title": "CVE-2023-3567" }, { "cve": "CVE-2023-3611", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3611" } ], "notes": [ { "category": "general", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3611", "url": "https://www.suse.com/security/cve/CVE-2023-3611" }, { "category": "external", "summary": "SUSE Bug 1213585 for CVE-2023-3611", "url": "https://bugzilla.suse.com/1213585" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-3611", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1223973 for CVE-2023-3611", "url": "https://bugzilla.suse.com/1223973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "moderate" } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3776", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3776" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3776", "url": "https://www.suse.com/security/cve/CVE-2023-3776" }, { "category": "external", "summary": "SUSE Bug 1213588 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1213588" }, { "category": "external", "summary": "SUSE Bug 1215119 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1215119" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1215674" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1223973 for CVE-2023-3776", "url": "https://bugzilla.suse.com/1223973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-16T06:13:06Z", "details": "important" } ], "title": "CVE-2023-3776" } ] }
rhsa-2019:1971
Vulnerability from csaf_redhat
Published
2019-07-30 11:02
Modified
2025-08-03 23:47
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)
* kernel: DMA attack using peripheral devices (Thunderclap) (BZ#1690716)
* kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service (CVE-2018-20784)
* kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)
* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update to the RHEL8.0.z batch#2 source tree (BZ#1717516)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)\n\n* kernel: DMA attack using peripheral devices (Thunderclap) (BZ#1690716)\n\n* kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service (CVE-2018-20784)\n\n* kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)\n\n* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL8.0.z batch#2 source tree (BZ#1717516)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1971", "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1680540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680540" }, { "category": "external", "summary": "1690716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690716" }, { "category": "external", "summary": "1709164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709164" }, { "category": "external", "summary": "1709180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "category": "external", "summary": "1710405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710405" }, { "category": "external", "summary": "1717516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717516" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1971.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T23:47:18+00:00", "generator": { "date": "2025-08-03T23:47:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:1971", "initial_release_date": "2019-07-30T11:02:54+00:00", "revision_history": [ { "date": "2019-07-30T11:02:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-07-30T11:02:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:47:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-80.7.1.rt9.153.el8_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "product": { "name": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "product_id": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.1.rt9.153.el8_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src" }, "product_reference": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src" }, "product_reference": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20784", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2019-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1680540" } ], "notes": [ { "category": "description", "text": "The CFS Linux kernel scheduler mishandles handling of leaf cfs_rq\u0027s in the kernel/sched/fair.c code, which allows a local unprivileged attacker to cause a denial of service (DoS) by entering an infinite loop in update_blocked_averages() function by inducing a high load on a system. Due to the nature of the flaw, a remote network attack (by initiating a magnitude of remote requests) cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20784" }, { "category": "external", "summary": "RHBZ#1680540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20784", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20784" } ], "release_date": "2018-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-30T11:02:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1971" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service" }, { "cve": "CVE-2019-11085", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1710405" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of GVT-g which allowed an attacker with access to a \u0027passed through\u0027 Intel i915 graphics card to possibly access resources allocated to other virtual machines, crash the host, or possibly corrupt memory leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11085" }, { "category": "external", "summary": "RHBZ#1710405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710405" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11085", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11085" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html" } ], "release_date": "2019-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-30T11:02:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1971" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation" }, { "cve": "CVE-2019-11810", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709164" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, prior to version 5.0.7, in drivers/scsi/megaraid/megaraid_sas_base.c, where a NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds(). An attacker can crash the system if they were able to load the megaraid_sas kernel module and groom memory beforehand, leading to a denial of service (DoS), related to a use-after-free.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "RHBZ#1709164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11810", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11810" } ], "release_date": "2019-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-30T11:02:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1971" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS" }, { "cve": "CVE-2019-11811", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709180" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of IPMI (remote baseband access). An attacker, with local access to read /proc/ioports, may be able to create a use-after-free condition when the kernel module is unloaded which may result in privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as \"Moderate\" as the attacker needs to be able to abuse this flaw in a very narrow race condition of the kernel module being unloaded. This scoring system from this flaw differentiates from other sources as the attacker must have a local account to be able to read the file (/proc/ioports) while the module is unloaded. None of the above actions are \u0027network facing\u0027 attack vectors.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11811" }, { "category": "external", "summary": "RHBZ#1709180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811" } ], "release_date": "2019-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-30T11:02:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "category": "workaround", "details": "A mitigation to this flaw would be to no longer use IPMI on affected hardware until the kernel has been updated. Existing systems that have IPMI kernel modules loaded will need to unload the \"ipmi_si\" kernel module and blacklist ( See https://access.redhat.com/solutions/41278 for a guide on how to blacklist modules). Take careful consideration that if unloading and blacklisting the module, this creates a one-time attack vector window for a local attacker.", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.1.rt9.153.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c" } ] }
rhsa-2019:1959
Vulnerability from csaf_redhat
Published
2019-07-30 09:43
Modified
2025-08-03 23:47
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)
* kernel: DMA attack using peripheral devices (Thunderclap) (BZ#1690716)
* kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service (CVE-2018-20784)
* kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)
* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [DELL 8.0 z-stream BUG] - "CPU unsupported" message with CFL-H/S 8+2 due to updated Stepping (BZ#1711048)
* RHEL8.0 Snapshot4 - [LTC Test] Guest crashes during vfio device hot-plug/un-plug operations. (kvm) (BZ#1714746)
* Using Transactional Memory (TM) in a Guest Locks-up Host Core on a Power9 System (BZ#1714751)
* VRSAVE register not properly saved and restored (BZ#1714753)
* Fix potential spectre gadget in arch/s390/kvm/interrupt.c (BZ#1714754)
* RHEL8.0 RC2 - kernel/KVM - count cache flush Spectre v2 mitigation (required for POWER9 DD2.3) (BZ#1715018)
* iommu/amd: Set exclusion range correctly (BZ#1715336)
* RHEL8.0 - sched/fair: Do not re-read ->h_load_next during hierarchical load calculation (BZ#1715337)
* cross compile builds are broken (BZ#1715339)
* Patch generated by 'make rh-test-patch' doesn't get applied during build (BZ#1715340)
* hard lockup panic in during execution of CFS bandwidth period timer (BZ#1715345)
* perf annotate -P does not give full paths (BZ#1716887)
* [Dell EMC 8.0 BUG] File system corrupting with I/O Stress on H330 PERC on AMD Systems if IOMMU passthrough is disabled (BZ#1717344)
* Fix Spectre v1 gadgets in drivers/gpu/drm/drm_bufs.c and drivers/gpu/drm/drm_ioctl.c (BZ#1717382)
* BUG: SELinux doesn't handle NFS crossmnt well (BZ#1717777)
* krb5{,i,p} doesn't work with older enctypes on aarch64 (BZ#1717800)
* [RHEL-8.0][s390x]ltp-lite mtest06 testing hits EWD due to: rcu: INFO: rcu_sched self-detected stall on CPU (BZ#1717801)
* RHEL 8 Snapshot-6: CN1200E SW iSCSI I/O performance degradation after a SCSI device/target reset rhel-8.0.0.z] (BZ#1717804)
* dm cache metadata: Fix loading discard bitset (BZ#1717868)
* jit'd java code on power9 ppc64le experiences stack corruption (BZ#1717869)
* BUG: connect(AF_UNSPEC, ...) on a connected socket returns an error (BZ#1717870)
* mm: BUG: unable to handle kernel paging request at 0000000057ac6e9d (BZ#1718237)
* [HPE 8.0 BUG] DCPMM fsdax boot initialization takes a long time causing auto-mount to fail (BZ#1719635)
* AMD Rome: WARNING: CPU: 1 PID: 0 at arch/x86/kernel/cpu/mcheck/mce.c:1510 mcheck_cpu_init+0x7a/0x460 (BZ#1721233)
* [RHEL8.1] AMD Rome: EDAC amd64: Error: F0 not found, device 0x1460 (broken BIOS?) (BZ#1722365)
* AMD Rome: Intermittent NMI received for unknown reason (BZ#1722367)
* [DELL 8.0 BUG] - "CPU unsupported" message with WHL-U due to updated Stepping (BZ#1722372)
Enhancement(s):
* RHEL 8 - AMD Rome Support (BZ#1721972)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)\n\n* kernel: DMA attack using peripheral devices (Thunderclap) (BZ#1690716)\n\n* kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service (CVE-2018-20784)\n\n* kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)\n\n* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [DELL 8.0 z-stream BUG] - \"CPU unsupported\" message with CFL-H/S 8+2 due to updated Stepping (BZ#1711048)\n\n* RHEL8.0 Snapshot4 - [LTC Test] Guest crashes during vfio device hot-plug/un-plug operations. (kvm) (BZ#1714746)\n\n* Using Transactional Memory (TM) in a Guest Locks-up Host Core on a Power9 System (BZ#1714751)\n\n* VRSAVE register not properly saved and restored (BZ#1714753)\n\n* Fix potential spectre gadget in arch/s390/kvm/interrupt.c (BZ#1714754)\n\n* RHEL8.0 RC2 - kernel/KVM - count cache flush Spectre v2 mitigation (required for POWER9 DD2.3) (BZ#1715018)\n\n* iommu/amd: Set exclusion range correctly (BZ#1715336)\n\n* RHEL8.0 - sched/fair: Do not re-read -\u003eh_load_next during hierarchical load calculation (BZ#1715337)\n\n* cross compile builds are broken (BZ#1715339)\n\n* Patch generated by \u0027make rh-test-patch\u0027 doesn\u0027t get applied during build (BZ#1715340)\n\n* hard lockup panic in during execution of CFS bandwidth period timer (BZ#1715345)\n\n* perf annotate -P does not give full paths (BZ#1716887)\n\n* [Dell EMC 8.0 BUG] File system corrupting with I/O Stress on H330 PERC on AMD Systems if IOMMU passthrough is disabled (BZ#1717344)\n\n* Fix Spectre v1 gadgets in drivers/gpu/drm/drm_bufs.c and drivers/gpu/drm/drm_ioctl.c (BZ#1717382)\n\n* BUG: SELinux doesn\u0027t handle NFS crossmnt well (BZ#1717777)\n\n* krb5{,i,p} doesn\u0027t work with older enctypes on aarch64 (BZ#1717800)\n\n* [RHEL-8.0][s390x]ltp-lite mtest06 testing hits EWD due to: rcu: INFO: rcu_sched self-detected stall on CPU (BZ#1717801)\n\n* RHEL 8 Snapshot-6: CN1200E SW iSCSI I/O performance degradation after a SCSI device/target reset rhel-8.0.0.z] (BZ#1717804)\n\n* dm cache metadata: Fix loading discard bitset (BZ#1717868)\n\n* jit\u0027d java code on power9 ppc64le experiences stack corruption (BZ#1717869)\n\n* BUG: connect(AF_UNSPEC, ...) on a connected socket returns an error (BZ#1717870)\n\n* mm: BUG: unable to handle kernel paging request at 0000000057ac6e9d (BZ#1718237)\n\n* [HPE 8.0 BUG] DCPMM fsdax boot initialization takes a long time causing auto-mount to fail (BZ#1719635)\n\n* AMD Rome: WARNING: CPU: 1 PID: 0 at arch/x86/kernel/cpu/mcheck/mce.c:1510 mcheck_cpu_init+0x7a/0x460 (BZ#1721233)\n\n* [RHEL8.1] AMD Rome: EDAC amd64: Error: F0 not found, device 0x1460 (broken BIOS?) (BZ#1722365)\n\n* AMD Rome: Intermittent NMI received for unknown reason (BZ#1722367)\n\n* [DELL 8.0 BUG] - \"CPU unsupported\" message with WHL-U due to updated Stepping (BZ#1722372)\n\nEnhancement(s):\n\n* RHEL 8 - AMD Rome Support (BZ#1721972)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1959", "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1680540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680540" }, { "category": "external", "summary": "1690716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690716" }, { "category": "external", "summary": "1709164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709164" }, { "category": "external", "summary": "1709180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "category": "external", "summary": "1710405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710405" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1959.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-03T23:47:10+00:00", "generator": { "date": "2025-08-03T23:47:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:1959", "initial_release_date": "2019-07-30T09:43:16+00:00", "revision_history": [ { "date": "2019-07-30T09:43:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-07-30T09:43:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:47:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "perf-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "perf-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.1.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "product": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "product_id": "python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.7.1.el8_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "perf-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "perf-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "product": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "product_id": "python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.7.1.el8_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "perf-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "perf-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "product": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "product_id": "python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.7.1.el8_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "perf-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "perf-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "bpftool-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.7.1.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.1.el8_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.7.1.el8_0?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "product": { "name": "kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "product_id": "kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.7.1.el8_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-80.7.1.el8_0.src", "product": { "name": "kernel-0:4.18.0-80.7.1.el8_0.src", "product_id": "kernel-0:4.18.0-80.7.1.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.1.el8_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "bpftool-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.src", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-80.7.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch" }, "product_reference": "kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "perf-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "perf-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "perf-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "perf-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "bpftool-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.src", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-80.7.1.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch" }, "product_reference": "kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "perf-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "perf-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "perf-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "perf-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20784", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2019-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1680540" } ], "notes": [ { "category": "description", "text": "The CFS Linux kernel scheduler mishandles handling of leaf cfs_rq\u0027s in the kernel/sched/fair.c code, which allows a local unprivileged attacker to cause a denial of service (DoS) by entering an infinite loop in update_blocked_averages() function by inducing a high load on a system. Due to the nature of the flaw, a remote network attack (by initiating a magnitude of remote requests) cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20784" }, { "category": "external", "summary": "RHBZ#1680540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20784", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20784" } ], "release_date": "2018-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-30T09:43:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1959" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service" }, { "cve": "CVE-2019-11085", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1710405" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of GVT-g which allowed an attacker with access to a \u0027passed through\u0027 Intel i915 graphics card to possibly access resources allocated to other virtual machines, crash the host, or possibly corrupt memory leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11085" }, { "category": "external", "summary": "RHBZ#1710405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710405" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11085", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11085" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html" } ], "release_date": "2019-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-30T09:43:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1959" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation" }, { "cve": "CVE-2019-11810", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709164" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, prior to version 5.0.7, in drivers/scsi/megaraid/megaraid_sas_base.c, where a NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds(). An attacker can crash the system if they were able to load the megaraid_sas kernel module and groom memory beforehand, leading to a denial of service (DoS), related to a use-after-free.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "RHBZ#1709164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11810", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11810" } ], "release_date": "2019-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-30T09:43:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1959" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS" }, { "cve": "CVE-2019-11811", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709180" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of IPMI (remote baseband access). An attacker, with local access to read /proc/ioports, may be able to create a use-after-free condition when the kernel module is unloaded which may result in privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as \"Moderate\" as the attacker needs to be able to abuse this flaw in a very narrow race condition of the kernel module being unloaded. This scoring system from this flaw differentiates from other sources as the attacker must have a local account to be able to read the file (/proc/ioports) while the module is unloaded. None of the above actions are \u0027network facing\u0027 attack vectors.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11811" }, { "category": "external", "summary": "RHBZ#1709180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811" } ], "release_date": "2019-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-30T09:43:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "category": "workaround", "details": "A mitigation to this flaw would be to no longer use IPMI on affected hardware until the kernel has been updated. Existing systems that have IPMI kernel modules loaded will need to unload the \"ipmi_si\" kernel module and blacklist ( See https://access.redhat.com/solutions/41278 for a guide on how to blacklist modules). Take careful consideration that if unloading and blacklisting the module, this creates a one-time attack vector window for a local attacker.", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.1.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.1.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c" } ] }
ghsa-qg2g-rfcv-qffx
Vulnerability from github
Published
2022-05-13 01:09
Modified
2022-05-13 01:09
Severity ?
VLAI Severity ?
Details
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
{ "affected": [], "aliases": [ "CVE-2018-20784" ], "database_specific": { "cwe_ids": [ "CWE-835" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-02-22T15:29:00Z", "severity": "CRITICAL" }, "details": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.", "id": "GHSA-qg2g-rfcv-qffx", "modified": "2022-05-13T01:09:56Z", "published": "2022-05-13T01:09:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20784" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "type": "WEB", "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4115-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4118-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4211-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4211-2" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2018-20784
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-20784", "description": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.", "id": "GSD-2018-20784", "references": [ "https://www.suse.com/security/cve/CVE-2018-20784.html", "https://access.redhat.com/errata/RHSA-2019:1971", "https://access.redhat.com/errata/RHSA-2019:1959", "https://ubuntu.com/security/CVE-2018-20784", "https://linux.oracle.com/cve/CVE-2018-20784.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-20784" ], "details": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.", "id": "GSD-2018-20784", "modified": "2023-12-13T01:22:28.936098Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20784", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2" }, { "name": "RHSA-2019:1959", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "name": "RHSA-2019:1971", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "name": "USN-4115-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "USN-4211-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4211-2/" }, { "name": "USN-4211-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4211-1/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.93", "versionStartIncluding": "4.13", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.15", "versionStartIncluding": "4.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.20.2", "versionStartIncluding": "4.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20784" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-835" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "name": "RHSA-2019:1959", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "name": "RHSA-2019:1971", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "name": "USN-4115-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "USN-4211-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4211-2/" }, { "name": "USN-4211-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4211-1/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2021-06-02T15:28Z", "publishedDate": "2019-02-22T15:29Z" } } }
fkie_cve-2018-20784
Vulnerability from fkie_nvd
Published
2019-02-22 15:29
Modified
2024-11-21 04:02
Severity ?
Summary
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0 | Patch, Vendor Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:1959 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:1971 | Third Party Advisory | |
cve@mitre.org | https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0 | Patch, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4115-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4118-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4211-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4211-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1959 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1971 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4115-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4118-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4211-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4211-2/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | 5.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux_for_real_time | 8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C6AA6D9-6073-4F71-8AF8-5F2828D88398", "versionEndExcluding": "4.14.93", "versionStartIncluding": "4.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E5568CD-D4BA-4C72-AC99-A0D2E7112EDD", "versionEndExcluding": "4.19.15", "versionStartIncluding": "4.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "22A4B1AF-0AE6-45BB-847A-470D03904BC4", "versionEndExcluding": "4.20.2", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B5F099C8-DC7F-48C6-AAF8-C0DBFFD49620", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", "matchCriteriaId": "CBF9BCF3-187F-410A-96CA-9C47D3ED6924", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load." }, { "lang": "es", "value": "En el kernel de Linux, en versiones anteriores a la 4.20.2, kernel/sched/fair.c gestiona leaf cfs_rq de manera incorrecta, lo que permite que los atacantes provoquen una denegaci\u00f3n de servicio (bucle infinito en update_blocked_averages) o, posiblemente, otro impacto sin especificar induciendo una carga alta." } ], "id": "CVE-2018-20784", "lastModified": "2024-11-21T04:02:10.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-22T15:29:00.237", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4115-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4211-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4211-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4115-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4211-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4211-2/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…